<?xml version="1.0" encoding="UTF-8"?>
<oval_definitions
	xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
	xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
	xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
      <oval:product_name>Marcus OVAL Generator</oval:product_name>
      <oval:schema_version>5.5</oval:schema_version>
      <oval:timestamp>2013-05-31T05:01:17</oval:timestamp>
  </generator>
  <definitions>
<definition id="oval:org.opensuse.security:def:20054881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4881</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2005-4881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4881" source="CVE"/>
	<description>
	The netlink subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.13-rc1 does not initialize certain padding fields in structures, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors, related to the (1) tc_fill_qdisc, (2) tcf_fill_node, (3) neightbl_fill_info, (4) neightbl_fill_param_info, (5) neigh_fill_info, (6) rtnetlink_fill_ifinfo, (7) rtnetlink_fill_iwinfo, (8) vif_delete, (9) ipmr_destroy_unres, (10) ipmr_cache_alloc_unres, (11) ipmr_cache_resolve, (12) inet6_fill_ifinfo, (13) tca_get_fill, (14) tca_action_flush, (15) tcf_add_notify, (16) tc_dump_action, (17) cbq_dump_police, (18) __nlmsg_put, (19) __rta_fill, (20) __rta_reserve, (21) inet6_fill_prefix, (22) rsvp_dump, and (23) cbq_dump_ovl functions.
	</description>
 </metadata>
<!-- 971c806ecaf91d73fc2850362bf9f623 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056428" comment="kernel-debug-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056429" comment="kernel-debug-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056430" comment="kernel-debug less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056431" comment="kernel-default-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056432" comment="kernel-default-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056433" comment="kernel-default less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056434" comment="kernel-docs less than 2.6.3-3.13.66"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056435" comment="kernel-kdump less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056436" comment="kernel-pae-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056437" comment="kernel-pae-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056438" comment="kernel-pae less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056439" comment="kernel-ppc64-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056440" comment="kernel-ppc64-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056441" comment="kernel-ppc64 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056442" comment="kernel-ps3 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056443" comment="kernel-source less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056444" comment="kernel-syms less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056445" comment="kernel-trace-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056446" comment="kernel-trace-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056447" comment="kernel-trace less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056448" comment="kernel-vanilla less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056449" comment="kernel-xen-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056450" comment="kernel-xen-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056451" comment="kernel-xen less than 2.6.27.39-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0045</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2007-0045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0048</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2007-0048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048" source="CVE"/>
	<description>
	Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, when used with Internet Explorer, Google Chrome, or Opera, allows remote attackers to cause a denial of service (memory consumption) via a long sequence of # (hash) characters appended to a PDF URL, related to a "cross-site scripting issue."
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1320</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2007-1320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1320" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to "attempting to mark non-existent regions as dirty," aka the "bitblt" heap overflow.
	</description>
 </metadata>
<!-- 7abb948acb0b1ce068cda139837121ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044426" comment="kvm less than 78-6.5.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5729</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2007-5729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5729" source="CVE"/>
	<description>
	The NE2000 emulator in QEMU 0.8.2 allows local users to execute arbitrary code by writing Ethernet frames with a size larger than the MTU to the EN0_TCNT register, which triggers a heap-based buffer overflow in the slirp library, aka NE2000 "mtu" heap overflow.  NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the mtu overflow vulnerability.
	</description>
 </metadata>
<!-- 7abb948acb0b1ce068cda139837121ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044426" comment="kvm less than 78-6.5.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6720</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2007-6720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6720" source="CVE"/>
	<description>
	libmikmod 3.1.9 through 3.2.0, as used by MikMod, SDL-mixer, and possibly other products, relies on the channel count of the last loaded song, rather than the currently playing song, for certain playback calculations, which allows user-assisted attackers to cause a denial of service (application crash) by loading multiple songs (aka MOD files) with different numbers of channels.
	</description>
 </metadata>
<!-- 483cd936b357a16ed8cf98eb89cf66bb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047601" comment="libmikmod-32bit less than 3.1.11a-71.56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047602" comment="libmikmod-64bit less than 3.1.11a-71.56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047603" comment="libmikmod-devel less than 3.1.11a-71.56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047604" comment="libmikmod less than 3.1.11a-71.56.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6725</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2007-6725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6725" source="CVE"/>
	<description>
	The CCITTFax decoding filter in Ghostscript 8.60, 8.61, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file that triggers a buffer underflow in the cf_decode_2d function.
	</description>
 </metadata>
<!-- fdc70560402b44cb7ce9829765211428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047631" comment="ghostscript-devel less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047632" comment="ghostscript-fonts-other less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047633" comment="ghostscript-fonts-rus less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047634" comment="ghostscript-fonts-std less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047635" comment="ghostscript-ijs-devel less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047636" comment="ghostscript-library less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047637" comment="ghostscript-omni less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047638" comment="ghostscript-x11 less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047639" comment="libgimpprint-devel less than 4.2.7-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047640" comment="libgimpprint less than 4.2.7-31.43.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0928</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-0928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0928" source="CVE"/>
	<description>
	Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.
	</description>
 </metadata>
<!-- 16c36122c59d358a826ddcb1751e0bad -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044428" comment="qemu less than 0.10.1-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1391</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-1391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1391" source="CVE"/>
	<description>
	Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.
	</description>
 </metadata>
<!-- 7f2cb38ab30086b2e83a460f9fab3881 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063995" comment="glibc-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063996" comment="glibc-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063997" comment="glibc-devel-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063998" comment="glibc-devel-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063999" comment="glibc-devel less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064000" comment="glibc-html less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064001" comment="glibc-i18ndata less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064002" comment="glibc-info less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064003" comment="glibc-locale-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064004" comment="glibc-locale-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064005" comment="glibc-locale less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064006" comment="glibc-obsolete less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064007" comment="glibc-profile-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064008" comment="glibc-profile-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064009" comment="glibc-profile less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064010" comment="glibc less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064011" comment="nscd less than 2.9-2.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1586</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1586" source="CVE"/>
	<description>
	ImageIO in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allow remote attackers to cause a denial of service (memory consumption and device reset) via a crafted TIFF image.
	</description>
 </metadata>
<!-- fd6a7b1f51e96a87a0d34df3c4f6f410 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048717" comment="libtiff-devel-32bit less than 3.8.2-133.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048718" comment="libtiff-devel-64bit less than 3.8.2-133.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048719" comment="libtiff-devel less than 3.8.2-133.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048720" comment="libtiff3-32bit less than 3.8.2-133.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048721" comment="libtiff3-64bit less than 3.8.2-133.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048722" comment="libtiff3 less than 3.8.2-133.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048723" comment="tiff less than 3.8.2-133.35.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1945</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-1945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1945" source="CVE"/>
	<description>
	QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.
	</description>
 </metadata>
<!-- 16c36122c59d358a826ddcb1751e0bad -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044428" comment="qemu less than 0.10.1-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2025</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-2025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2025" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE openSUSE 11.0, and before 1.2.9-162.163.2 on SUSE openSUSE 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "insufficient quoting of parameters."
	</description>
 </metadata>
<!-- c682b5327539dc71ac6da407e2a329a6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048977" comment="struts-javadoc less than 1.2.9-162.163.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048978" comment="struts-manual less than 1.2.9-162.163.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048979" comment="struts-webapps-tomcat6 less than 1.2.9-162.163.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048980" comment="struts less than 1.2.9-162.163.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2086</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-2086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2086" source="CVE"/>
	<description>
	Sun Java Web Start and Java Plug-in for JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allow remote attackers to execute arbitrary code via a crafted jnlp file that modifies the (1) java.home, (2) java.ext.dirs, or (3) user.home System Properties, aka "Java Web Start File Inclusion" and CR 6694892.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2380</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-2380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2380" source="CVE"/>
	<description>
	SQL injection vulnerability in authpgsqllib.c in Courier-Authlib before 0.62.0, when a non-Latin locale Postgres database is used, allows remote attackers to execute arbitrary SQL commands via query parameters containing apostrophes.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5c86a4566d37ba8391a72cebc0b4bf2f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049301" comment="courier-authlib-devel less than 0.61.0-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049302" comment="courier-authlib-ldap less than 0.61.0-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049303" comment="courier-authlib-mysql less than 0.61.0-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049304" comment="courier-authlib-pgsql less than 0.61.0-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049305" comment="courier-authlib-pipe less than 0.61.0-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049306" comment="courier-authlib-userdb less than 0.61.0-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049307" comment="courier-authlib less than 0.61.0-1.21.1"/>
		</criteria>
	</criteria>
	<!-- e2377105f5b568fc97c36d1bfcee9bef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049315" comment="courier-authlib-devel less than 0.61.0-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049316" comment="courier-authlib-ldap less than 0.61.0-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049317" comment="courier-authlib-mysql less than 0.61.0-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049318" comment="courier-authlib-pgsql less than 0.61.0-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049319" comment="courier-authlib-pipe less than 0.61.0-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049320" comment="courier-authlib-userdb less than 0.61.0-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049321" comment="courier-authlib less than 0.61.0-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2382</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-2382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2382" source="CVE"/>
	<description>
	The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16c36122c59d358a826ddcb1751e0bad -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044428" comment="qemu less than 0.10.1-0.1.1"/>
	</criteria>
	<!-- 7abb948acb0b1ce068cda139837121ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044426" comment="kvm less than 78-6.5.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2383</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-2383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2383" source="CVE"/>
	<description>
	CRLF injection vulnerability in xterm allows user-assisted attackers to execute arbitrary commands via LF (aka \n) characters surrounding a command name within a Device Control Request Status String (DECRQSS) escape sequence in a text file, a related issue to CVE-2003-0063 and CVE-2003-0071.
	</description>
 </metadata>
<!-- 8afc868e710da562541aa3e8ae475577 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049323" comment="xterm less than 236-1.50.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2712</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-2712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2712" source="CVE"/>
	<description>
	Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw.  NOTE: the originally reported version was 7.1.314, but the researcher actually found this set of issues in 7.1.298.  NOTE: the zipplugin issue (originally vector 2 in this identifier) has been subsumed by CVE-2008-3075.
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049359" comment="gvim less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049360" comment="vim-base less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049361" comment="vim-data less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049362" comment="vim-enhanced less than 7.2-7.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3074</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-3074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3074" source="CVE"/>
	<description>
	The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a tar archive and possibly (2) the filename of the first file in a tar archive, which is not properly handled by the VIM TAR plugin (tar.vim) v.10 through v.22, as demonstrated by the shellescape, tarplugin.v2, tarplugin, and tarplugin.updated test cases.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712. NOTE: this issue has the same root cause as CVE-2008-3075.  NOTE: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier.
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049359" comment="gvim less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049360" comment="vim-base less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049361" comment="vim-data less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049362" comment="vim-enhanced less than 7.2-7.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3075</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3075" source="CVE"/>
	<description>
	The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a ZIP archive and possibly (2) the filename of the first file in a ZIP archive, which is not properly handled by zip.vim in the VIM ZIP plugin (zipPlugin.vim) v.11 through v.21, as demonstrated by the zipplugin and zipplugin.v2 test cases.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712.  NOTE: this issue has the same root cause as CVE-2008-3074.  NOTE: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier.
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049359" comment="gvim less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049360" comment="vim-base less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049361" comment="vim-data less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049362" comment="vim-enhanced less than 7.2-7.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3076</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-3076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3076" source="CVE"/>
	<description>
	The Netrw plugin 125 in netrw.vim in Vim 7.2a.10 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames used by the execute and system functions within the (1) mz and (2) mc commands, as demonstrated by the netrw.v2 and netrw.v3 test cases.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712.
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049359" comment="gvim less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049360" comment="vim-base less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049361" comment="vim-data less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049362" comment="vim-enhanced less than 7.2-7.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3443</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-3443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3443" source="CVE"/>
	<description>
	The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053202" comment="ruby-devel less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053203" comment="ruby-doc-html less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053204" comment="ruby-doc-ri less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053205" comment="ruby-examples less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053206" comment="ruby-test-suite less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053207" comment="ruby-tk less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053208" comment="ruby less than 1.8.7.p72-5.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3655</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-3655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655" source="CVE"/>
	<description>
	Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053202" comment="ruby-devel less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053203" comment="ruby-doc-html less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053204" comment="ruby-doc-ri less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053205" comment="ruby-examples less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053206" comment="ruby-test-suite less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053207" comment="ruby-tk less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053208" comment="ruby less than 1.8.7.p72-5.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3656</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656" source="CVE"/>
	<description>
	Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053202" comment="ruby-devel less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053203" comment="ruby-doc-html less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053204" comment="ruby-doc-ri less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053205" comment="ruby-examples less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053206" comment="ruby-test-suite less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053207" comment="ruby-tk less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053208" comment="ruby less than 1.8.7.p72-5.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3657</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-3657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657" source="CVE"/>
	<description>
	The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053202" comment="ruby-devel less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053203" comment="ruby-doc-html less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053204" comment="ruby-doc-ri less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053205" comment="ruby-examples less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053206" comment="ruby-test-suite less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053207" comment="ruby-tk less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053208" comment="ruby less than 1.8.7.p72-5.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3790</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-3790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790" source="CVE"/>
	<description>
	The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053202" comment="ruby-devel less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053203" comment="ruby-doc-html less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053204" comment="ruby-doc-ri less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053205" comment="ruby-examples less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053206" comment="ruby-test-suite less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053207" comment="ruby-tk less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053208" comment="ruby less than 1.8.7.p72-5.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3905</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-3905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905" source="CVE"/>
	<description>
	resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053202" comment="ruby-devel less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053203" comment="ruby-doc-html less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053204" comment="ruby-doc-ri less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053205" comment="ruby-examples less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053206" comment="ruby-test-suite less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053207" comment="ruby-tk less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053208" comment="ruby less than 1.8.7.p72-5.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3916</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-3916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3916" source="CVE"/>
	<description>
	Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename.  NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.
	</description>
 </metadata>
<!-- ebcb328f58a9c31323f4d3b12580d20a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065275" comment="ed less than 0.2-1001.15.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4311</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4311" source="CVE"/>
	<description>
	The default configuration of system.conf in D-Bus (aka DBus) before 1.2.6 omits the send_type attribute in certain rules, which allows local users to bypass intended access restrictions by (1) sending messages, related to send_requested_reply; and possibly (2) receiving messages, related to receive_requested_reply.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13c937d3606adace2e8dedbbe22db566 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050468" comment="dbus-1-32bit less than 1.2.10-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050469" comment="dbus-1-64bit less than 1.2.10-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050470" comment="dbus-1-devel-doc less than 1.2.10-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050471" comment="dbus-1-devel less than 1.2.10-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050472" comment="dbus-1 less than 1.2.10-5.4.1"/>
		</criteria>
	</criteria>
	<!-- 460e57f8a54866847c868f70d9b2b866 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050501" comment="hal-32bit less than 0.5.12-10.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050502" comment="hal-64bit less than 0.5.12-10.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050503" comment="hal-devel less than 0.5.12-10.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050504" comment="hal less than 0.5.12-10.13.1"/>
		</criteria>
	</criteria>
	<!-- 4b3c0f5b4b9623bc273dca4d06ba7639 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050505" comment="gnome-panel-32bit less than 2.24.1-2.26.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050506" comment="gnome-panel-devel less than 2.24.1-2.26.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050507" comment="gnome-panel-doc less than 2.24.1-2.26.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050508" comment="gnome-panel-extras less than 2.24.1-2.26.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050509" comment="gnome-panel-lang less than 2.24.1-2.26.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050510" comment="gnome-panel less than 2.24.1-2.26.1"/>
		</criteria>
	</criteria>
	<!-- 8ea81c8defa53ca2e4c48fd8ccc062b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050539" comment="dbus-1-32bit less than 1.2.10-5.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050540" comment="dbus-1-64bit less than 1.2.10-5.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050541" comment="dbus-1-devel-doc less than 1.2.10-5.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050542" comment="dbus-1-devel less than 1.2.10-5.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050543" comment="dbus-1-glib-32bit less than 0.76-32.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050544" comment="dbus-1-glib-64bit less than 0.76-32.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050545" comment="dbus-1-glib-devel less than 0.76-32.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050546" comment="dbus-1-glib-doc less than 0.76-32.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050547" comment="dbus-1-glib less than 0.76-32.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050548" comment="dbus-1-mono less than 0.63-118.117.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050549" comment="dbus-1-python-devel less than 0.83.0-22.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050550" comment="dbus-1-python less than 0.83.0-22.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050551" comment="dbus-1-qt3-32bit less than 0.62-221.222.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050552" comment="dbus-1-qt3-64bit less than 0.62-221.222.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050553" comment="dbus-1-qt3-devel less than 0.62-221.222.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050554" comment="dbus-1-qt3 less than 0.62-221.222.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050555" comment="dbus-1-x11 less than 1.2.10-5.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050556" comment="dbus-1 less than 1.2.10-5.3.1"/>
		</criteria>
	</criteria>
	<!-- ce8d49091feba05d135b748932f79e78 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050565" comment="PackageKit-devel less than 0.3.11-1.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050566" comment="PackageKit-lang less than 0.3.11-1.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050567" comment="PackageKit less than 0.3.11-1.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050568" comment="libpackagekit-glib10-devel less than 0.3.11-1.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050569" comment="libpackagekit-glib10 less than 0.3.11-1.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050570" comment="libpackagekit-qt10-devel less than 0.3.11-1.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050571" comment="libpackagekit-qt10 less than 0.3.11-1.13.1"/>
		</criteria>
	</criteria>
	<!-- d637089c2c430dc9222bf429c2e6993e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050576" comment="PolicyKit-32bit less than 0.9-13.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050577" comment="PolicyKit-64bit less than 0.9-13.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050578" comment="PolicyKit-devel less than 0.9-13.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050579" comment="PolicyKit less than 0.9-13.17.1"/>
		</criteria>
	</criteria>
	<!-- f6ababff0ac1f84c0494cc435c55da99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050590" comment="ConsoleKit-32bit less than 0.2.10-60.26.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050591" comment="ConsoleKit-64bit less than 0.2.10-60.26.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050592" comment="ConsoleKit-devel less than 0.2.10-60.26.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050593" comment="ConsoleKit-x11 less than 0.2.10-60.26.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050594" comment="ConsoleKit less than 0.2.10-60.26.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4314</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314" source="CVE"/>
	<description>
	smbd in Samba 3.0.29 through 3.2.4 might allow remote attackers to read arbitrary memory and cause a denial of service via crafted (1) trans, (2) trans2, and (3) nttrans requests, related to a "cut&amp;paste error" that causes an improper bounds check to be performed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aba3a52238dabac82fa8decba6d5c778 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009050661" comment="cifs-mount less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050662" comment="ldapsmb less than 1.34b-5.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050663" comment="libnetapi-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050664" comment="libnetapi0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050665" comment="libsmbclient-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050666" comment="libsmbclient0-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050667" comment="libsmbclient0-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050668" comment="libsmbclient0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050669" comment="libsmbsharemodes-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050670" comment="libsmbsharemodes0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050671" comment="libtalloc-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050672" comment="libtalloc1-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050673" comment="libtalloc1-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050674" comment="libtalloc1 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050675" comment="libtdb-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050676" comment="libtdb1-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050677" comment="libtdb1-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050678" comment="libtdb1 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050679" comment="libwbclient-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050680" comment="libwbclient0-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050681" comment="libwbclient0-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050682" comment="libwbclient0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050683" comment="samba-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050684" comment="samba-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050685" comment="samba-client-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050686" comment="samba-client-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050687" comment="samba-client less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050688" comment="samba-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050689" comment="samba-krb-printing less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050690" comment="samba-vscan less than 0.3.6b-5.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050691" comment="samba-winbind-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050692" comment="samba-winbind-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050693" comment="samba-winbind less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050694" comment="samba less than 3.2.6-0.3.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111-debug is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009050661" comment="cifs-mount less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050662" comment="ldapsmb less than 1.34b-5.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050663" comment="libnetapi-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050664" comment="libnetapi0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050665" comment="libsmbclient-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050666" comment="libsmbclient0-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050668" comment="libsmbclient0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050669" comment="libsmbsharemodes-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050670" comment="libsmbsharemodes0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050671" comment="libtalloc-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050672" comment="libtalloc1-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050674" comment="libtalloc1 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050675" comment="libtdb-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050676" comment="libtdb1-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050678" comment="libtdb1 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050679" comment="libwbclient-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050680" comment="libwbclient0-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050682" comment="libwbclient0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050683" comment="samba-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050685" comment="samba-client-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050687" comment="samba-client less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050688" comment="samba-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050689" comment="samba-krb-printing less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050690" comment="samba-vscan less than 0.3.6b-5.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050691" comment="samba-winbind-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050693" comment="samba-winbind less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050694" comment="samba less than 3.2.6-0.3.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d11e16275915a8d91096a5c200deea60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050661" comment="cifs-mount less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050695" comment="keyutils less than 1.2-107.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050696" comment="keyutils less than 1.2-107.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050662" comment="ldapsmb less than 1.34b-5.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050663" comment="libnetapi-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050664" comment="libnetapi0 less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050665" comment="libsmbclient-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050666" comment="libsmbclient0-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050667" comment="libsmbclient0-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050668" comment="libsmbclient0 less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050669" comment="libsmbsharemodes-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050670" comment="libsmbsharemodes0 less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050671" comment="libtalloc-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050672" comment="libtalloc1-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050673" comment="libtalloc1-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050674" comment="libtalloc1 less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050675" comment="libtdb-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050676" comment="libtdb1-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050677" comment="libtdb1-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050678" comment="libtdb1 less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050679" comment="libwbclient-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050680" comment="libwbclient0-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050681" comment="libwbclient0-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050682" comment="libwbclient0 less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050683" comment="samba-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050684" comment="samba-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050685" comment="samba-client-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050686" comment="samba-client-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050687" comment="samba-client less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050688" comment="samba-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050689" comment="samba-krb-printing less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050690" comment="samba-vscan less than 0.3.6b-5.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050691" comment="samba-winbind-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050692" comment="samba-winbind-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050693" comment="samba-winbind less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050694" comment="samba less than 3.2.6-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4316</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316" source="CVE"/>
	<description>
	Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
	</description>
 </metadata>
<!-- e0e3299170caa507a0306e46453bdbe0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050772" comment="glib2-branding-upstream less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050773" comment="glib2-devel less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050774" comment="glib2-doc less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050775" comment="glib2-lang less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050776" comment="glib2 less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050777" comment="libgio-2_0-0-32bit less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050778" comment="libgio-2_0-0-64bit less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050779" comment="libgio-2_0-0 less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050780" comment="libgio-fam less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050781" comment="libglib-2_0-0-32bit less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050782" comment="libglib-2_0-0-64bit less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050783" comment="libglib-2_0-0 less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050784" comment="libgmodule-2_0-0-32bit less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050785" comment="libgmodule-2_0-0-64bit less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050786" comment="libgmodule-2_0-0 less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050787" comment="libgobject-2_0-0-32bit less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050788" comment="libgobject-2_0-0-64bit less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050789" comment="libgobject-2_0-0 less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050790" comment="libgthread-2_0-0-32bit less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050791" comment="libgthread-2_0-0-64bit less than 2.18.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050792" comment="libgthread-2_0-0 less than 2.18.2-5.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4360</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4360" source="CVE"/>
	<description>
	mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access restrictions, as demonstrated by a request for a .PHP file when there is a configuration rule for .php files.
	</description>
 </metadata>
<!-- 1081a4ce9f85a36c0b29013e86b9d031 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056486" comment="lighttpd-mod_cml less than 1.4.20-2.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056487" comment="lighttpd-mod_magnet less than 1.4.20-2.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056488" comment="lighttpd-mod_mysql_vhost less than 1.4.20-2.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056489" comment="lighttpd-mod_rrdtool less than 1.4.20-2.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056490" comment="lighttpd-mod_trigger_b4_dl less than 1.4.20-2.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056491" comment="lighttpd-mod_webdav less than 1.4.20-2.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056492" comment="lighttpd less than 1.4.20-2.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4456</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4456" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document.  NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67.
	</description>
 </metadata>
<!-- 00f6af27c9453ea91d6031df5dac835c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054336" comment="libmysqlclient-devel less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054337" comment="libmysqlclient15-32bit less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054338" comment="libmysqlclient15-64bit less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054339" comment="libmysqlclient15 less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054340" comment="libmysqlclient_r15-32bit less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054341" comment="libmysqlclient_r15-64bit less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054342" comment="libmysqlclient_r15 less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054343" comment="mysql-Max less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054344" comment="mysql-bench less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054345" comment="mysql-client less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054346" comment="mysql-debug less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054347" comment="mysql-test less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054348" comment="mysql-tools less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054349" comment="mysql less than 5.0.67-12.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4539</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4539" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX "bitblt" heap overflow.  NOTE: this issue exists because of an incorrect fix for CVE-2007-1320.
	</description>
 </metadata>
<!-- 16c36122c59d358a826ddcb1751e0bad -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009044428" comment="qemu less than 0.10.1-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4546</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4546" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows remote web servers to cause a denial of service (NULL pointer dereference and browser crash) by returning a different response when an HTTP request is sent a second time, as demonstrated by two responses that provide SWF files with different SWF version numbers.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4575</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4575" source="CVE"/>
	<description>
	Buffer overflow in the DoCommand function in jhead before 2.84 might allow context-dependent attackers to cause a denial of service (crash) via (1) a long -cmd argument and (2) unspecified vectors related to "a bunch of potential string overflows."
	</description>
 </metadata>
<!-- 60a7eebd98be5aca456464d144eb5065 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050858" comment="jhead less than 2.84-1.24.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4639</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4639" source="CVE"/>
	<description>
	jhead.c in Matthias Wandel jhead 2.84 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file.
	</description>
 </metadata>
<!-- 60a7eebd98be5aca456464d144eb5065 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050858" comment="jhead less than 2.84-1.24.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4640</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4640" source="CVE"/>
	<description>
	The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and earlier allows local users to delete arbitrary files via vectors involving a modified input filename in which (1) a final "z" character is replaced by a "t" character or (2) a final "t" character is replaced by a "z" character.
	</description>
 </metadata>
<!-- 60a7eebd98be5aca456464d144eb5065 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050858" comment="jhead less than 2.84-1.24.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4641</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4641" source="CVE"/>
	<description>
	The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and earlier allows attackers to execute arbitrary commands via shell metacharacters in unspecified input.
	</description>
 </metadata>
<!-- 60a7eebd98be5aca456464d144eb5065 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050858" comment="jhead less than 2.84-1.24.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4677</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4677" source="CVE"/>
	<description>
	autoload/netrw.vim (aka the Netrw Plugin) 109, 131, and other versions before 133k for Vim 7.1.266, other 7.1 versions, and 7.2 stores credentials for an FTP session, and sends those credentials when attempting to establish subsequent FTP sessions to servers on different hosts, which allows remote FTP servers to obtain sensitive information in opportunistic circumstances by logging usernames and passwords.  NOTE: the upstream vendor disputes a vector involving different ports on the same host, stating "I'm assuming that they're using the same id and password on that unchanged hostname, deliberately."
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049359" comment="gvim less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049360" comment="vim-base less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049361" comment="vim-data less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049362" comment="vim-enhanced less than 7.2-7.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4776</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4776" source="CVE"/>
	<description>
	libgadu before 1.8.2 allows remote servers to cause a denial of service (crash) via a contact description with a large length, which triggers a buffer over-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b7ffa4b088034686f08e44d578e30993 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065276" comment="kdenetwork3-IRC less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065277" comment="kdenetwork3-InstantMessenger less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065278" comment="kdenetwork3-devel less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065279" comment="kdenetwork3-dialup less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065280" comment="kdenetwork3-lan less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065281" comment="kdenetwork3-lisa less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065282" comment="kdenetwork3-news less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065283" comment="kdenetwork3-query less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065284" comment="kdenetwork3-vnc less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065285" comment="kdenetwork3-wireless less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065286" comment="kdenetwork3 less than 3.5.10-12.11.1"/>
		</criteria>
	</criteria>
	<!-- bf1ca3be2e3996a378ffaf6247d0eb15 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065214" comment="kde4-kdnssd less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065215" comment="kde4-kget less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065216" comment="kde4-knewsticker less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065217" comment="kde4-kopete-devel less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065218" comment="kde4-kopete less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065219" comment="kde4-kppp less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065220" comment="kde4-krdc less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065221" comment="kde4-krfb less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065222" comment="kdenetwork4-filesharing less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065223" comment="kdenetwork4 less than 4.1.3-4.15.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4989</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-4989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989" source="CVE"/>
	<description>
	The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).
	</description>
 </metadata>
<!-- 92f7ada346fab894a17174ed22b46b03 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050981" comment="gnutls less than 2.4.1-24.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050982" comment="libgnutls-devel less than 2.4.1-24.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050983" comment="libgnutls-extra-devel less than 2.4.1-24.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050984" comment="libgnutls-extra26 less than 2.4.1-24.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050985" comment="libgnutls26-32bit less than 2.4.1-24.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050986" comment="libgnutls26-64bit less than 2.4.1-24.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050987" comment="libgnutls26 less than 2.4.1-24.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5006</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5006" source="CVE"/>
	<description>
	smtp.c in the c-client library in University of Washington IMAP Toolkit 2007b allows remote SMTP servers to cause a denial of service (NULL pointer dereference and application crash) by responding to the QUIT command with a close of the TCP connection instead of the expected 221 response code.
	</description>
 </metadata>
<!-- 640adae6ec729c16814640840f88d6db -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051008" comment="imap-devel less than 2006c1_suse-127.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051009" comment="imap-lib less than 2006c1_suse-127.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5027</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5027" source="CVE"/>
	<description>
	The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.
	</description>
 </metadata>
<!-- a812820c670eafc24704125a7cb48a19 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051016" comment="nagios-devel less than 3.0.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051017" comment="nagios-www less than 3.0.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051018" comment="nagios less than 3.0.6-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5028</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5028" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in cmd.cgi in (1) Nagios 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote attackers to send commands to the Nagios process, and trigger execution of arbitrary programs by this process, via unspecified HTTP requests.
	</description>
 </metadata>
<!-- a812820c670eafc24704125a7cb48a19 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051016" comment="nagios-devel less than 3.0.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051017" comment="nagios-www less than 3.0.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051018" comment="nagios less than 3.0.6-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5077</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077" source="CVE"/>
	<description>
	OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7cc020b24990406f52b364aad965f3be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051035" comment="libopenssl-devel less than 0.9.8h-28.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051036" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051037" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051038" comment="libopenssl0_9_8 less than 0.9.8h-28.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051039" comment="openssl-certs less than 0.9.8h-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051040" comment="openssl-doc less than 0.9.8h-28.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051041" comment="openssl less than 0.9.8h-28.7.1"/>
		</criteria>
	</criteria>
	<!-- 87fa06ce6c77615d48e5d5ced99a033e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051045" comment="compat-openssl097g-32bit less than 0.9.7g-145.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051046" comment="compat-openssl097g-64bit less than 0.9.7g-145.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051047" comment="compat-openssl097g less than 0.9.7g-145.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5079</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5079" source="CVE"/>
	<description>
	net/atm/svc.c in the ATM subsystem in the Linux kernel 2.6.27.8 and earlier allows local users to cause a denial of service (kernel infinite loop) by making two calls to svc_listen for the same socket, and then reading a /proc/net/atm/*vc file, related to corruption of the vcc table.
	</description>
 </metadata>
<!-- d43c750889c7750653f9465722a4aa13 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051055" comment="kernel-debug-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051056" comment="kernel-debug-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051057" comment="kernel-debug less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051058" comment="kernel-default-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051059" comment="kernel-default-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051060" comment="kernel-default less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051061" comment="kernel-docs less than 2.6.3-3.13.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051062" comment="kernel-kdump less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051063" comment="kernel-pae-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051064" comment="kernel-pae-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051065" comment="kernel-pae less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051066" comment="kernel-ppc64-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051067" comment="kernel-ppc64-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051068" comment="kernel-ppc64 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051069" comment="kernel-ps3 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051070" comment="kernel-source less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051071" comment="kernel-syms less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051072" comment="kernel-trace-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051073" comment="kernel-trace-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051074" comment="kernel-trace less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051075" comment="kernel-vanilla less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051076" comment="kernel-xen-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051077" comment="kernel-xen-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051078" comment="kernel-xen less than 2.6.27.19-3.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5081</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5081" source="CVE"/>
	<description>
	The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.
	</description>
 </metadata>
<!-- b314913be23c588a2e6ca4da67095855 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051104" comment="avahi-compat-howl-devel less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051105" comment="avahi-compat-mDNSResponder-devel less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051106" comment="avahi-utils less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051107" comment="avahi less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051108" comment="libavahi-client3-32bit less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051109" comment="libavahi-client3-64bit less than 0.6.23-9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051110" comment="libavahi-client3 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051111" comment="libavahi-common3-32bit less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051112" comment="libavahi-common3-64bit less than 0.6.23-9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051113" comment="libavahi-common3 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051114" comment="libavahi-core5 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051115" comment="libavahi-devel less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051116" comment="libavahi-glib-devel less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051117" comment="libavahi-glib1-32bit less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051118" comment="libavahi-glib1-64bit less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051119" comment="libavahi-glib1 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051120" comment="libavahi-gobject-devel less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051121" comment="libavahi-gobject0 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051122" comment="libavahi-ui0 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051123" comment="libdns_sd-32bit less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051124" comment="libdns_sd-64bit less than 0.6.23-9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051125" comment="libdns_sd less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051126" comment="libhowl0 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051127" comment="python-avahi less than 0.6.23-9.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111-debug is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051104" comment="avahi-compat-howl-devel less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051105" comment="avahi-compat-mDNSResponder-devel less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051106" comment="avahi-utils less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051107" comment="avahi less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051108" comment="libavahi-client3-32bit less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051110" comment="libavahi-client3 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051111" comment="libavahi-common3-32bit less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051113" comment="libavahi-common3 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051114" comment="libavahi-core5 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051115" comment="libavahi-devel less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051116" comment="libavahi-glib-devel less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051117" comment="libavahi-glib1-32bit less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051119" comment="libavahi-glib1 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051120" comment="libavahi-gobject-devel less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051121" comment="libavahi-gobject0 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051122" comment="libavahi-ui0 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051123" comment="libdns_sd-32bit less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051125" comment="libdns_sd less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051126" comment="libhowl0 less than 0.6.23-9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051127" comment="python-avahi less than 0.6.23-9.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5086</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5086" source="CVE"/>
	<description>
	Multiple methods in libvirt 0.3.2 through 0.5.1 do not check if a connection is read-only, which allows local users to bypass intended access restrictions and perform administrative actions.
	</description>
 </metadata>
<!-- c08769770b29c96fb099387f28e32809 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051138" comment="libvirt-devel less than 0.4.6-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051139" comment="libvirt-doc less than 0.4.6-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051140" comment="libvirt-python less than 0.4.6-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051141" comment="libvirt less than 0.4.6-11.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5101</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5101" source="CVE"/>
	<description>
	Buffer overflow in the BMP reader in OptiPNG 0.6 and 0.6.1 allows user-assisted attackers to execute arbitrary code via a crafted BMP image, related to an "array overflow."
	</description>
 </metadata>
<!-- a5c0a2df14cab64172e080cf34313719 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051143" comment="optipng less than 0.6.1-10.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5138</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5138" source="CVE"/>
	<description>
	passwdehd in libpam-mount 0.43 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/passwdehd.##### temporary file.
	</description>
 </metadata>
<!-- 19eded2f1b85d76a42034869fdd319b4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051147" comment="pam_mount-32bit less than 0.47-12.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051148" comment="pam_mount-64bit less than 0.47-12.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051149" comment="pam_mount less than 0.47-12.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5285</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5285" source="CVE"/>
	<description>
	Wireshark 1.0.4 and earlier allows remote attackers to cause a denial of service via a long SMTP request, which triggers an infinite loop.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 30883355dba58203ab1a80837c81c97c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051184" comment="wireshark-devel less than 1.0.4-2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051185" comment="wireshark less than 1.0.4-2.1"/>
		</criteria>
	</criteria>
	<!-- 8a5b211463bf378141efc77025cf1329 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051186" comment="wireshark-devel less than 1.0.4-2.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051187" comment="wireshark less than 1.0.4-2.6.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5302</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5302" source="CVE"/>
	<description>
	Race condition in the rmtree function in File::Path 1.08 and 2.07 (lib/File/Path.pm) in Perl 5.8.8 and 5.10.0 allows local users to create arbitrary setuid binaries via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. NOTE: this is a regression error related to CVE-2005-0448.  It is different from CVE-2008-5303 due to affected versions.
	</description>
 </metadata>
<!-- b65a417490e98fb4af7653921928f7f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051193" comment="perl-32bit less than 5.10.0-62.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051194" comment="perl-64bit less than 5.10.0-62.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051195" comment="perl-base-32bit less than 5.10.0-62.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051196" comment="perl-base-64bit less than 5.10.0-62.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051197" comment="perl-base less than 5.10.0-62.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051198" comment="perl-doc less than 5.10.0-62.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051199" comment="perl less than 5.10.0-62.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5339</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5339" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted JWS applications to perform network connections to unauthorized hosts via unknown vectors, aka CR 6727079.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5340</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5340" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted JWS applications to gain privileges to access local files or applications via unknown vectors, aka 6727081.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5341</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5341" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows untrusted JWS applications to obtain the pathname of the JWS cache and the application username via unknown vectors, aka CR 6727071.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5342</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5342" source="CVE"/>
	<description>
	Unspecified vulnerability in the BasicService for Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted downloaded applications to cause local files to be displayed in the browser of the user of the untrusted application via unknown vectors, aka 6767668.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5343</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5343" source="CVE"/>
	<description>
	Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows remote attackers to make unauthorized network connections and hijack HTTP sessions via a crafted file that validates as both a GIF and a Java JAR file, aka "GIFAR" and CR 6707535.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5344</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5344" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted applets to read arbitrary files and make unauthorized network connections via unknown vectors related to applet classloading, aka 6716217.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5345</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5345" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier allows code that is loaded from a local filesystem to read arbitrary files and make unauthorized connections to localhost via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5346</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5346" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 or earlier allows untrusted applets and applications to read arbitrary memory via a crafted ZIP file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5347</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5347" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier allow untrusted applets and applications to gain privileges via vectors related to access to inner classes in the (1) JAX-WS and (2) JAXB packages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a0f07fdc9ce6bbfd4cc7ed1b99979b39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051208" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051209" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051210" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051211" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051212" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051213" comment="java-1_6_0-openjdk less than 1.4_b14-24.2.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5348</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5348" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier, when using Kerberos authentication, allows remote attackers to cause a denial of service (OS resource consumption) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a0f07fdc9ce6bbfd4cc7ed1b99979b39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051208" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051209" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051210" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051211" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051212" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051213" comment="java-1_6_0-openjdk less than 1.4_b14-24.2.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5349</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5349" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows remote attackers to cause a denial of service (CPU consumption) via a crafted RSA public key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a0f07fdc9ce6bbfd4cc7ed1b99979b39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051208" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051209" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051210" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051211" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051212" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051213" comment="java-1_6_0-openjdk less than 1.4_b14-24.2.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5350</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5350" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted applications and applets to list the contents of the operating user's directory via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a0f07fdc9ce6bbfd4cc7ed1b99979b39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051208" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051209" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051210" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051211" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051212" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051213" comment="java-1_6_0-openjdk less than 1.4_b14-24.2.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5351</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5351" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier accepts UTF-8 encodings that are not the "shortest" form, which makes it easier for attackers to bypass protection mechanisms for other applications that rely on shortest-form UTF-8 encodings.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a0f07fdc9ce6bbfd4cc7ed1b99979b39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051208" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051209" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051210" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051211" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051212" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051213" comment="java-1_6_0-openjdk less than 1.4_b14-24.2.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5352</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5352" source="CVE"/>
	<description>
	Integer overflow in the JAR unpacking utility (unpack200) in the unpack library (unpack.dll) in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows untrusted applications and applets to gain privileges via a Pack200 compressed JAR file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a0f07fdc9ce6bbfd4cc7ed1b99979b39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051208" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051209" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051210" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051211" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051212" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051213" comment="java-1_6_0-openjdk less than 1.4_b14-24.2.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5353</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5353" source="CVE"/>
	<description>
	The Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not properly enforce context of ZoneInfo objects during deserialization, which allows remote attackers to run untrusted applets and applications in a privileged context, as demonstrated by "deserializing Calendar objects".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a0f07fdc9ce6bbfd4cc7ed1b99979b39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051208" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051209" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051210" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051211" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051212" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051213" comment="java-1_6_0-openjdk less than 1.4_b14-24.2.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5354</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5354" source="CVE"/>
	<description>
	Stack-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows locally-launched and possibly remote untrusted Java applications to execute arbitrary code via a JAR file with a long Main-Class manifest entry.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a0f07fdc9ce6bbfd4cc7ed1b99979b39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051208" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051209" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051210" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051211" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051212" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051213" comment="java-1_6_0-openjdk less than 1.4_b14-24.2.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5355</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5355" source="CVE"/>
	<description>
	The "Java Update" feature for Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not verify the signature of the JRE that is downloaded, which allows remote attackers to execute arbitrary code via DNS man-in-the-middle attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5356</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5356" source="CVE"/>
	<description>
	Heap-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier might allow remote attackers to execute arbitrary code via a crafted TrueType font file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a0f07fdc9ce6bbfd4cc7ed1b99979b39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051208" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051209" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051210" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051211" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051212" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051213" comment="java-1_6_0-openjdk less than 1.4_b14-24.2.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5357</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5357" source="CVE"/>
	<description>
	Integer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code via a crafted TrueType font file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a0f07fdc9ce6bbfd4cc7ed1b99979b39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051208" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051209" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051210" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051211" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051212" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051213" comment="java-1_6_0-openjdk less than 1.4_b14-24.2.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5358</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5358" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier might allow remote attackers to execute arbitrary code via a crafted GIF file that triggers memory corruption during display of the splash screen, possibly related to splashscreen.dll.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a0f07fdc9ce6bbfd4cc7ed1b99979b39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051208" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051209" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051210" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051211" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051212" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051213" comment="java-1_6_0-openjdk less than 1.4_b14-24.2.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5359</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5359" source="CVE"/>
	<description>
	Buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code, related to a ConvolveOp operation in the Java AWT library.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a0f07fdc9ce6bbfd4cc7ed1b99979b39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051208" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051209" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051210" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051211" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051212" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051213" comment="java-1_6_0-openjdk less than 1.4_b14-24.2.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5360</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5360" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier creates temporary files with predictable file names, which allows attackers to write malicious JAR files via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049001" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049002" comment="java-1_5_0-sun-devel less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049003" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049004" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049005" comment="java-1_5_0-sun less than 1.5.0_update17-1.1"/>
		</criteria>
	</criteria>
	<!-- a0f07fdc9ce6bbfd4cc7ed1b99979b39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051208" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051209" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051210" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051211" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051212" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051213" comment="java-1_6_0-openjdk less than 1.4_b14-24.2.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049006" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049007" comment="java-1_6_0-sun-devel less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049008" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049009" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049010" comment="java-1_6_0-sun less than 1.6.0.u11-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5498</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5498" source="CVE"/>
	<description>
	Array index error in the imageRotate function in PHP 5.2.8 and earlier allows context-dependent attackers to read the contents of arbitrary memory locations via a crafted value of the third argument (aka the bgd_color or clrBack argument) for an indexed image.
	</description>
 </metadata>
<!-- 3291c2ef45434af34802ca073998445d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051269" comment="apache2-mod_php5 less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051270" comment="php5-bcmath less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051271" comment="php5-bz2 less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051272" comment="php5-calendar less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051273" comment="php5-ctype less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051274" comment="php5-curl less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051275" comment="php5-dba less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051276" comment="php5-dbase less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051277" comment="php5-devel less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051278" comment="php5-dom less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051279" comment="php5-exif less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051280" comment="php5-fastcgi less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051281" comment="php5-ftp less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051282" comment="php5-gd less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051283" comment="php5-gettext less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051284" comment="php5-gmp less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051285" comment="php5-hash less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051286" comment="php5-iconv less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051287" comment="php5-imap less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051288" comment="php5-json less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051289" comment="php5-ldap less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051290" comment="php5-mbstring less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051291" comment="php5-mcrypt less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051292" comment="php5-mysql less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051293" comment="php5-ncurses less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051294" comment="php5-odbc less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051295" comment="php5-openssl less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051296" comment="php5-pcntl less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051297" comment="php5-pdo less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051298" comment="php5-pear less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051299" comment="php5-pgsql less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051300" comment="php5-posix less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051301" comment="php5-pspell less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051302" comment="php5-readline less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051303" comment="php5-shmop less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051304" comment="php5-snmp less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051305" comment="php5-soap less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051306" comment="php5-sockets less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051307" comment="php5-sqlite less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051308" comment="php5-suhosin less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051309" comment="php5-sysvmsg less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051310" comment="php5-sysvsem less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051311" comment="php5-sysvshm less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051312" comment="php5-tidy less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051313" comment="php5-tokenizer less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051314" comment="php5-wddx less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051315" comment="php5-xmlreader less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051316" comment="php5-xmlrpc less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051317" comment="php5-xmlwriter less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051318" comment="php5-xsl less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051319" comment="php5-zip less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051320" comment="php5-zlib less than 5.2.9-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5499</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5499" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player for Linux 10.0.12.36, and 9.0.151.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file.
	</description>
 </metadata>
<!-- 38e55e93c138aa8cec67ead2fb83a654 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051377" comment="flash-player less than 10.0.15.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5500</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to (1) a reachable assertion or (2) an integer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 251d2e1eab81470e9bea3698d1f7ed50 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051395" comment="mozilla-xulrunner190-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051396" comment="mozilla-xulrunner190-devel less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051397" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051398" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051399" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051400" comment="mozilla-xulrunner190-translations less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051401" comment="mozilla-xulrunner190 less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051402" comment="python-xpcom190 less than 1.9.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051409" comment="MozillaThunderbird-devel less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051410" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051411" comment="MozillaThunderbird less than 2.0.0.19-0.1.2"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051412" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051413" comment="mozilla-xulrunner181-devel less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051414" comment="mozilla-xulrunner181-l10n-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051415" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051416" comment="mozilla-xulrunner181 less than 1.8.1.19-1.1"/>
		</criteria>
	</criteria>
	<!-- ec37f2af0c4ffbbed6f804ca2a311447 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051419" comment="MozillaFirefox-translations less than 3.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051420" comment="MozillaFirefox less than 3.0.5-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5501</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5501" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service via vectors that trigger an assertion failure.
	</description>
 </metadata>
<!-- ec37f2af0c4ffbbed6f804ca2a311447 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051419" comment="MozillaFirefox-translations less than 3.0.5-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051420" comment="MozillaFirefox less than 3.0.5-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5502</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5502" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) via vectors that trigger memory corruption, related to the GetXMLEntity and FastAppendChar functions.
	</description>
 </metadata>
<!-- ec37f2af0c4ffbbed6f804ca2a311447 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051419" comment="MozillaFirefox-translations less than 3.0.5-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051420" comment="MozillaFirefox less than 3.0.5-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5503</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503" source="CVE"/>
	<description>
	The loadBindingDocument function in Mozilla Firefox 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not perform any security checks related to the same-domain policy, which allows remote attackers to read or access data from other domains via crafted XBL bindings.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 251d2e1eab81470e9bea3698d1f7ed50 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051395" comment="mozilla-xulrunner190-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051396" comment="mozilla-xulrunner190-devel less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051397" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051398" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051399" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051400" comment="mozilla-xulrunner190-translations less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051401" comment="mozilla-xulrunner190 less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051402" comment="python-xpcom190 less than 1.9.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051409" comment="MozillaThunderbird-devel less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051410" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051411" comment="MozillaThunderbird less than 2.0.0.19-0.1.2"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051412" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051413" comment="mozilla-xulrunner181-devel less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051414" comment="mozilla-xulrunner181-l10n-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051415" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051416" comment="mozilla-xulrunner181 less than 1.8.1.19-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5505</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5505" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 allows remote attackers to bypass intended privacy restrictions by using the persist attribute in an XUL element to create and access data entities that are similar to cookies.
	</description>
 </metadata>
<!-- ec37f2af0c4ffbbed6f804ca2a311447 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051419" comment="MozillaFirefox-translations less than 3.0.5-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051420" comment="MozillaFirefox less than 3.0.5-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5506</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-controlled resource that uses a 302 redirect to a resource in a different domain, then reading content from the response, aka "response disclosure."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 251d2e1eab81470e9bea3698d1f7ed50 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051395" comment="mozilla-xulrunner190-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051396" comment="mozilla-xulrunner190-devel less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051397" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051398" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051399" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051400" comment="mozilla-xulrunner190-translations less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051401" comment="mozilla-xulrunner190 less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051402" comment="python-xpcom190 less than 1.9.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051409" comment="MozillaThunderbird-devel less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051410" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051411" comment="MozillaThunderbird less than 2.0.0.19-0.1.2"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051412" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051413" comment="mozilla-xulrunner181-devel less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051414" comment="mozilla-xulrunner181-l10n-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051415" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051416" comment="mozilla-xulrunner181 less than 1.8.1.19-1.1"/>
		</criteria>
	</criteria>
	<!-- ec37f2af0c4ffbbed6f804ca2a311447 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051419" comment="MozillaFirefox-translations less than 3.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051420" comment="MozillaFirefox less than 3.0.5-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5507</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to bypass the same origin policy and access portions of data from another domain via a JavaScript URL that redirects to the target resource, which generates an error if the target data does not have JavaScript syntax, which can be accessed using the window.onerror DOM API.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 251d2e1eab81470e9bea3698d1f7ed50 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051395" comment="mozilla-xulrunner190-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051396" comment="mozilla-xulrunner190-devel less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051397" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051398" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051399" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051400" comment="mozilla-xulrunner190-translations less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051401" comment="mozilla-xulrunner190 less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051402" comment="python-xpcom190 less than 1.9.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051409" comment="MozillaThunderbird-devel less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051410" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051411" comment="MozillaThunderbird less than 2.0.0.19-0.1.2"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051412" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051413" comment="mozilla-xulrunner181-devel less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051414" comment="mozilla-xulrunner181-l10n-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051415" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051416" comment="mozilla-xulrunner181 less than 1.8.1.19-1.1"/>
		</criteria>
	</criteria>
	<!-- ec37f2af0c4ffbbed6f804ca2a311447 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051419" comment="MozillaFirefox-translations less than 3.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051420" comment="MozillaFirefox less than 3.0.5-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5508</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not properly parse URLs with leading whitespace or control characters, which might allow remote attackers to misrepresent URLs and simplify phishing attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 251d2e1eab81470e9bea3698d1f7ed50 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051395" comment="mozilla-xulrunner190-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051396" comment="mozilla-xulrunner190-devel less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051397" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051398" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051399" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051400" comment="mozilla-xulrunner190-translations less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051401" comment="mozilla-xulrunner190 less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051402" comment="python-xpcom190 less than 1.9.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051409" comment="MozillaThunderbird-devel less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051410" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051411" comment="MozillaThunderbird less than 2.0.0.19-0.1.2"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051412" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051413" comment="mozilla-xulrunner181-devel less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051414" comment="mozilla-xulrunner181-l10n-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051415" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051416" comment="mozilla-xulrunner181 less than 1.8.1.19-1.1"/>
		</criteria>
	</criteria>
	<!-- ec37f2af0c4ffbbed6f804ca2a311447 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051419" comment="MozillaFirefox-translations less than 3.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051420" comment="MozillaFirefox less than 3.0.5-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5510</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510" source="CVE"/>
	<description>
	The CSS parser in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 ignores the '\0' escaped null character, which might allow remote attackers to bypass protection mechanisms such as sanitization routines.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 251d2e1eab81470e9bea3698d1f7ed50 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051395" comment="mozilla-xulrunner190-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051396" comment="mozilla-xulrunner190-devel less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051397" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051398" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051399" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051400" comment="mozilla-xulrunner190-translations less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051401" comment="mozilla-xulrunner190 less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051402" comment="python-xpcom190 less than 1.9.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051409" comment="MozillaThunderbird-devel less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051410" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051411" comment="MozillaThunderbird less than 2.0.0.19-0.1.2"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051412" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051413" comment="mozilla-xulrunner181-devel less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051414" comment="mozilla-xulrunner181-l10n-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051415" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051416" comment="mozilla-xulrunner181 less than 1.8.1.19-1.1"/>
		</criteria>
	</criteria>
	<!-- ec37f2af0c4ffbbed6f804ca2a311447 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051419" comment="MozillaFirefox-translations less than 3.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051420" comment="MozillaFirefox less than 3.0.5-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5511</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy and conduct cross-site scripting (XSS) attacks via an XBL binding to an "unloaded document."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 251d2e1eab81470e9bea3698d1f7ed50 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051395" comment="mozilla-xulrunner190-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051396" comment="mozilla-xulrunner190-devel less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051397" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051398" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051399" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051400" comment="mozilla-xulrunner190-translations less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051401" comment="mozilla-xulrunner190 less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051402" comment="python-xpcom190 less than 1.9.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051409" comment="MozillaThunderbird-devel less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051410" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051411" comment="MozillaThunderbird less than 2.0.0.19-0.1.2"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051412" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051413" comment="mozilla-xulrunner181-devel less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051414" comment="mozilla-xulrunner181-l10n-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051415" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051416" comment="mozilla-xulrunner181 less than 1.8.1.19-1.1"/>
		</criteria>
	</criteria>
	<!-- ec37f2af0c4ffbbed6f804ca2a311447 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051419" comment="MozillaFirefox-translations less than 3.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051420" comment="MozillaFirefox less than 3.0.5-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5512</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to run arbitrary JavaScript with chrome privileges via unknown vectors in which "page content can pollute XPCNativeWrappers."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 251d2e1eab81470e9bea3698d1f7ed50 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051395" comment="mozilla-xulrunner190-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051396" comment="mozilla-xulrunner190-devel less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051397" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051398" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051399" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051400" comment="mozilla-xulrunner190-translations less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051401" comment="mozilla-xulrunner190 less than 1.9.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051402" comment="python-xpcom190 less than 1.9.0.5-1.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051409" comment="MozillaThunderbird-devel less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051410" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051411" comment="MozillaThunderbird less than 2.0.0.19-0.1.2"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051412" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051413" comment="mozilla-xulrunner181-devel less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051414" comment="mozilla-xulrunner181-l10n-32bit less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051415" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051416" comment="mozilla-xulrunner181 less than 1.8.1.19-1.1"/>
		</criteria>
	</criteria>
	<!-- ec37f2af0c4ffbbed6f804ca2a311447 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051419" comment="MozillaFirefox-translations less than 3.0.5-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051420" comment="MozillaFirefox less than 3.0.5-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5513</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513" source="CVE"/>
	<description>
	Unspecified vulnerability in the session-restore feature in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19 allows remote attackers to bypass the same origin policy, inject content into documents associated with other domains, and conduct cross-site scripting (XSS) attacks via unknown vectors related to restoration of SessionStore data.
	</description>
 </metadata>
<!-- ec37f2af0c4ffbbed6f804ca2a311447 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051419" comment="MozillaFirefox-translations less than 3.0.5-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051420" comment="MozillaFirefox less than 3.0.5-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5514</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5514" source="CVE"/>
	<description>
	Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow.
	</description>
 </metadata>
<!-- 640adae6ec729c16814640840f88d6db -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051008" comment="imap-devel less than 2006c1_suse-127.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051009" comment="imap-lib less than 2006c1_suse-127.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5515</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5515" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 654c73dbf6fd8c8fee7aa6bef342dba6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051437" comment="tomcat6-admin-webapps less than 6.0.18-16.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051438" comment="tomcat6-docs-webapp less than 6.0.18-16.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051439" comment="tomcat6-javadoc less than 6.0.18-16.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051440" comment="tomcat6-jsp-2_1-api less than 6.0.18-16.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051441" comment="tomcat6-lib less than 6.0.18-16.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051442" comment="tomcat6-servlet-2_5-api less than 6.0.18-16.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051443" comment="tomcat6-webapps less than 6.0.18-16.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051444" comment="tomcat6 less than 6.0.18-16.2.1"/>
		</criteria>
	</criteria>
	<!-- 7e1e6b6f70f7446f288f1801380c41c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059317" comment="tomcat6-admin-webapps less than 6.0.18-16.3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059318" comment="tomcat6-docs-webapp less than 6.0.18-16.3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059319" comment="tomcat6-javadoc less than 6.0.18-16.3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059320" comment="tomcat6-jsp-2_1-api less than 6.0.18-16.3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059321" comment="tomcat6-lib less than 6.0.18-16.3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059322" comment="tomcat6-servlet-2_5-api less than 6.0.18-16.3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059323" comment="tomcat6-webapps less than 6.0.18-16.3.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059324" comment="tomcat6 less than 6.0.18-16.3.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5519</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5519" source="CVE"/>
	<description>
	The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.
	</description>
 </metadata>
<!-- 75d26deab5ae41117b9e9fbccb1c5244 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056033" comment="apache2-mod_jk less than 1.2.26-1.44.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5557</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5557" source="CVE"/>
	<description>
	Heap-based buffer overflow in ext/mbstring/libmbfl/filters/mbfilter_htmlent.c in the mbstring extension in PHP 4.3.0 through 5.2.6 allows context-dependent attackers to execute arbitrary code via a crafted string containing an HTML entity, which is not properly handled during Unicode conversion, related to the (1) mb_convert_encoding, (2) mb_check_encoding, (3) mb_convert_variables, and (4) mb_parse_str functions.
	</description>
 </metadata>
<!-- 119a5e76286999a9037a4721e0b5e5cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051445" comment="apache2-mod_php5 less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051446" comment="php5-bcmath less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051447" comment="php5-bz2 less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051448" comment="php5-calendar less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051449" comment="php5-ctype less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051450" comment="php5-curl less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051451" comment="php5-dba less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051452" comment="php5-dbase less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051453" comment="php5-devel less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051454" comment="php5-dom less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051455" comment="php5-exif less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051456" comment="php5-fastcgi less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051457" comment="php5-ftp less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051458" comment="php5-gd less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051459" comment="php5-gettext less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051460" comment="php5-gmp less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051461" comment="php5-hash less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051462" comment="php5-iconv less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051463" comment="php5-imap less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051464" comment="php5-json less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051465" comment="php5-ldap less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051466" comment="php5-mbstring less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051467" comment="php5-mcrypt less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051468" comment="php5-mysql less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051469" comment="php5-ncurses less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051470" comment="php5-odbc less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051471" comment="php5-openssl less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051472" comment="php5-pcntl less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051473" comment="php5-pdo less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051474" comment="php5-pear less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051475" comment="php5-pgsql less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051476" comment="php5-posix less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051477" comment="php5-pspell less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051478" comment="php5-readline less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051479" comment="php5-shmop less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051480" comment="php5-snmp less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051481" comment="php5-soap less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051482" comment="php5-sockets less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051483" comment="php5-sqlite less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051484" comment="php5-suhosin less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051485" comment="php5-sysvmsg less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051486" comment="php5-sysvsem less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051487" comment="php5-sysvshm less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051488" comment="php5-tidy less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051489" comment="php5-tokenizer less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051490" comment="php5-wddx less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051491" comment="php5-xmlreader less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051492" comment="php5-xmlrpc less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051493" comment="php5-xmlwriter less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051494" comment="php5-xsl less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051495" comment="php5-zip less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051496" comment="php5-zlib less than 5.2.6-49.14.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5587</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5587" source="CVE"/>
	<description>
	Directory traversal vulnerability in libraries/lib.inc.php in phpPgAdmin 4.2.1 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the _language parameter to index.php.
	</description>
 </metadata>
<!-- b9472610e9807bc5daba05dd9149d1ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051547" comment="phpPgAdmin less than 4.2-1.72.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5617</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5617" source="CVE"/>
	<description>
	The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a7d1636d4c2158ed057a9e3cf5dfc09 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051548" comment="rsyslog less than 3.18.3-4.33.1"/>
	</criteria>
	<!-- a04c9d58d09b512f61f28547476596ba -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051549" comment="rsyslog less than 3.18.3-4.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5618</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5618" source="CVE"/>
	<description>
	imudp in rsyslog 4.x before 4.1.2, 3.21 before 3.21.9 beta, and 3.20 before 3.20.2 generates a message even when it is sent by an unauthorized sender, which allows remote attackers to cause a denial of service (disk consumption) via a large number of spurious messages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a7d1636d4c2158ed057a9e3cf5dfc09 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051548" comment="rsyslog less than 3.18.3-4.33.1"/>
	</criteria>
	<!-- a04c9d58d09b512f61f28547476596ba -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051549" comment="rsyslog less than 3.18.3-4.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5624</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5624" source="CVE"/>
	<description>
	PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.
	</description>
 </metadata>
<!-- 051e60b1cd753810bd1e57e8fa1e5d07 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058185" comment="apache2-mod_php5 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058186" comment="php5-bcmath less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058187" comment="php5-bz2 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058188" comment="php5-calendar less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058189" comment="php5-ctype less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058190" comment="php5-curl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058191" comment="php5-dba less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058192" comment="php5-dbase less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058193" comment="php5-devel less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058194" comment="php5-dom less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058195" comment="php5-exif less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058196" comment="php5-fastcgi less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058197" comment="php5-ftp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058198" comment="php5-gd less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058199" comment="php5-gettext less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058200" comment="php5-gmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058201" comment="php5-hash less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058202" comment="php5-iconv less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058203" comment="php5-imap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058204" comment="php5-json less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058205" comment="php5-ldap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058206" comment="php5-mbstring less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058207" comment="php5-mcrypt less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058208" comment="php5-mysql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058209" comment="php5-ncurses less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058210" comment="php5-odbc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058211" comment="php5-openssl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058212" comment="php5-pcntl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058213" comment="php5-pdo less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058214" comment="php5-pear less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058215" comment="php5-pgsql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058216" comment="php5-posix less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058217" comment="php5-pspell less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058218" comment="php5-readline less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058219" comment="php5-shmop less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058220" comment="php5-snmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058221" comment="php5-soap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058222" comment="php5-sockets less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058223" comment="php5-sqlite less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058224" comment="php5-suhosin less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058225" comment="php5-sysvmsg less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058226" comment="php5-sysvsem less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058227" comment="php5-sysvshm less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058228" comment="php5-tidy less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058229" comment="php5-tokenizer less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058230" comment="php5-wddx less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058231" comment="php5-xmlreader less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058232" comment="php5-xmlrpc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058233" comment="php5-xmlwriter less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058234" comment="php5-xsl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058235" comment="php5-zip less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058236" comment="php5-zlib less than 5.2.12-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5625</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5625" source="CVE"/>
	<description>
	PHP 5 before 5.2.7 does not enforce the error_log safe_mode restrictions when safe_mode is enabled through a php_admin_flag setting in httpd.conf, which allows context-dependent attackers to write to arbitrary files by placing a "php_value error_log" entry in a .htaccess file.
	</description>
 </metadata>
<!-- 051e60b1cd753810bd1e57e8fa1e5d07 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058185" comment="apache2-mod_php5 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058186" comment="php5-bcmath less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058187" comment="php5-bz2 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058188" comment="php5-calendar less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058189" comment="php5-ctype less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058190" comment="php5-curl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058191" comment="php5-dba less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058192" comment="php5-dbase less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058193" comment="php5-devel less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058194" comment="php5-dom less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058195" comment="php5-exif less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058196" comment="php5-fastcgi less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058197" comment="php5-ftp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058198" comment="php5-gd less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058199" comment="php5-gettext less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058200" comment="php5-gmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058201" comment="php5-hash less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058202" comment="php5-iconv less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058203" comment="php5-imap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058204" comment="php5-json less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058205" comment="php5-ldap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058206" comment="php5-mbstring less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058207" comment="php5-mcrypt less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058208" comment="php5-mysql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058209" comment="php5-ncurses less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058210" comment="php5-odbc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058211" comment="php5-openssl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058212" comment="php5-pcntl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058213" comment="php5-pdo less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058214" comment="php5-pear less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058215" comment="php5-pgsql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058216" comment="php5-posix less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058217" comment="php5-pspell less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058218" comment="php5-readline less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058219" comment="php5-shmop less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058220" comment="php5-snmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058221" comment="php5-soap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058222" comment="php5-sockets less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058223" comment="php5-sqlite less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058224" comment="php5-suhosin less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058225" comment="php5-sysvmsg less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058226" comment="php5-sysvsem less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058227" comment="php5-sysvshm less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058228" comment="php5-tidy less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058229" comment="php5-tokenizer less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058230" comment="php5-wddx less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058231" comment="php5-xmlreader less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058232" comment="php5-xmlrpc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058233" comment="php5-xmlwriter less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058234" comment="php5-xsl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058235" comment="php5-zip less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058236" comment="php5-zlib less than 5.2.12-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5658</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5658" source="CVE"/>
	<description>
	Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences.
	</description>
 </metadata>
<!-- 119a5e76286999a9037a4721e0b5e5cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051445" comment="apache2-mod_php5 less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051446" comment="php5-bcmath less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051447" comment="php5-bz2 less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051448" comment="php5-calendar less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051449" comment="php5-ctype less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051450" comment="php5-curl less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051451" comment="php5-dba less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051452" comment="php5-dbase less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051453" comment="php5-devel less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051454" comment="php5-dom less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051455" comment="php5-exif less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051456" comment="php5-fastcgi less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051457" comment="php5-ftp less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051458" comment="php5-gd less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051459" comment="php5-gettext less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051460" comment="php5-gmp less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051461" comment="php5-hash less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051462" comment="php5-iconv less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051463" comment="php5-imap less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051464" comment="php5-json less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051465" comment="php5-ldap less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051466" comment="php5-mbstring less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051467" comment="php5-mcrypt less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051468" comment="php5-mysql less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051469" comment="php5-ncurses less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051470" comment="php5-odbc less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051471" comment="php5-openssl less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051472" comment="php5-pcntl less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051473" comment="php5-pdo less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051474" comment="php5-pear less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051475" comment="php5-pgsql less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051476" comment="php5-posix less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051477" comment="php5-pspell less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051478" comment="php5-readline less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051479" comment="php5-shmop less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051480" comment="php5-snmp less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051481" comment="php5-soap less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051482" comment="php5-sockets less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051483" comment="php5-sqlite less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051484" comment="php5-suhosin less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051485" comment="php5-sysvmsg less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051486" comment="php5-sysvsem less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051487" comment="php5-sysvshm less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051488" comment="php5-tidy less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051489" comment="php5-tokenizer less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051490" comment="php5-wddx less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051491" comment="php5-xmlreader less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051492" comment="php5-xmlrpc less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051493" comment="php5-xmlwriter less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051494" comment="php5-xsl less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051495" comment="php5-zip less than 5.2.6-49.14.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051496" comment="php5-zlib less than 5.2.6-49.14.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5660</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5660" source="CVE"/>
	<description>
	Format string vulnerability in the vinagre_utils_show_error function (src/vinagre-utils.c) in Vinagre 0.5.x before 0.5.2 and 2.x before 2.24.2 might allow remote attackers to execute arbitrary code via format string specifiers in a crafted URI or VNC server response.
	</description>
 </metadata>
<!-- e14be41886864b475a975327ebd187c2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051551" comment="vinagre less than 2.24.1-1.31.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5679</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5679" source="CVE"/>
	<description>
	The HTML parsing engine in Opera before 9.63 allows remote attackers to execute arbitrary code via crafted web pages that trigger an invalid pointer calculation and heap corruption.
	</description>
 </metadata>
<!-- 74cc3d906e7554b295e021cfbb7be468 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036272" comment="opera less than 9.63-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5680</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5680" source="CVE"/>
	<description>
	Multiple buffer overflows in Opera before 9.63 might allow (1) remote attackers to execute arbitrary code via a crafted text area, or allow (2) user-assisted remote attackers to execute arbitrary code via a long host name in a file: URL.  NOTE: this might overlap CVE-2008-5178.
	</description>
 </metadata>
<!-- 74cc3d906e7554b295e021cfbb7be468 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036272" comment="opera less than 9.63-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5681</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5681" source="CVE"/>
	<description>
	Opera before 9.63 does not block unspecified "scripted URLs" during the feed preview, which allows remote attackers to read existing subscriptions and force subscriptions to arbitrary feed URLs.
	</description>
 </metadata>
<!-- 74cc3d906e7554b295e021cfbb7be468 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036272" comment="opera less than 9.63-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5682</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5682" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Opera before 9.63 allows remote attackers to inject arbitrary web script or HTML via built-in XSLT templates.
	</description>
 </metadata>
<!-- 74cc3d906e7554b295e021cfbb7be468 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036272" comment="opera less than 9.63-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5683</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5683" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.63 allows remote attackers to "reveal random data" via unknown vectors.
	</description>
 </metadata>
<!-- 74cc3d906e7554b295e021cfbb7be468 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036272" comment="opera less than 9.63-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5700</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5700" source="CVE"/>
	<description>
	libata in the Linux kernel before 2.6.27.9 does not set minimum timeouts for SG_IO requests, which allows local users to cause a denial of service (Programmed I/O mode on drives) via multiple simultaneous invocations of an unspecified test program.
	</description>
 </metadata>
<!-- d43c750889c7750653f9465722a4aa13 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051055" comment="kernel-debug-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051056" comment="kernel-debug-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051057" comment="kernel-debug less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051058" comment="kernel-default-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051059" comment="kernel-default-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051060" comment="kernel-default less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051061" comment="kernel-docs less than 2.6.3-3.13.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051062" comment="kernel-kdump less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051063" comment="kernel-pae-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051064" comment="kernel-pae-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051065" comment="kernel-pae less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051066" comment="kernel-ppc64-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051067" comment="kernel-ppc64-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051068" comment="kernel-ppc64 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051069" comment="kernel-ps3 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051070" comment="kernel-source less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051071" comment="kernel-syms less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051072" comment="kernel-trace-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051073" comment="kernel-trace-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051074" comment="kernel-trace less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051075" comment="kernel-vanilla less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051076" comment="kernel-xen-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051077" comment="kernel-xen-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051078" comment="kernel-xen less than 2.6.27.19-3.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5702</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5702" source="CVE"/>
	<description>
	Buffer underflow in the ibwdt_ioctl function in drivers/watchdog/ib700wdt.c in the Linux kernel before 2.6.28-rc1 might allow local users to have an unknown impact via a certain /dev/watchdog WDIOC_SETTIMEOUT IOCTL call.
	</description>
 </metadata>
<!-- d43c750889c7750653f9465722a4aa13 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051055" comment="kernel-debug-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051056" comment="kernel-debug-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051057" comment="kernel-debug less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051058" comment="kernel-default-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051059" comment="kernel-default-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051060" comment="kernel-default less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051061" comment="kernel-docs less than 2.6.3-3.13.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051062" comment="kernel-kdump less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051063" comment="kernel-pae-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051064" comment="kernel-pae-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051065" comment="kernel-pae less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051066" comment="kernel-ppc64-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051067" comment="kernel-ppc64-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051068" comment="kernel-ppc64 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051069" comment="kernel-ps3 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051070" comment="kernel-source less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051071" comment="kernel-syms less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051072" comment="kernel-trace-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051073" comment="kernel-trace-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051074" comment="kernel-trace less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051075" comment="kernel-vanilla less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051076" comment="kernel-xen-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051077" comment="kernel-xen-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051078" comment="kernel-xen less than 2.6.27.19-3.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5714</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5714" source="CVE"/>
	<description>
	Off-by-one error in monitor.c in Qemu 0.9.1 might make it easier for remote attackers to guess the VNC password, which is limited to seven characters where eight was intended.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16c36122c59d358a826ddcb1751e0bad -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044428" comment="qemu less than 0.10.1-0.1.1"/>
	</criteria>
	<!-- 7abb948acb0b1ce068cda139837121ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009044426" comment="kvm less than 78-6.5.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5718</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5718" source="CVE"/>
	<description>
	The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.
	</description>
 </metadata>
<!-- 33e8b3a372a563cdd33c79fa926310d4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051554" comment="netatalk-devel less than 2.0.3-246.13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051555" comment="netatalk less than 2.0.3-246.13.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5814</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5814" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in PHP, possibly 5.2.7 and earlier, when display_errors is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.  NOTE: because of the lack of details, it is unclear whether this is related to CVE-2006-0208.
	</description>
 </metadata>
<!-- 051e60b1cd753810bd1e57e8fa1e5d07 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058185" comment="apache2-mod_php5 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058186" comment="php5-bcmath less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058187" comment="php5-bz2 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058188" comment="php5-calendar less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058189" comment="php5-ctype less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058190" comment="php5-curl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058191" comment="php5-dba less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058192" comment="php5-dbase less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058193" comment="php5-devel less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058194" comment="php5-dom less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058195" comment="php5-exif less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058196" comment="php5-fastcgi less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058197" comment="php5-ftp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058198" comment="php5-gd less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058199" comment="php5-gettext less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058200" comment="php5-gmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058201" comment="php5-hash less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058202" comment="php5-iconv less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058203" comment="php5-imap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058204" comment="php5-json less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058205" comment="php5-ldap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058206" comment="php5-mbstring less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058207" comment="php5-mcrypt less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058208" comment="php5-mysql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058209" comment="php5-ncurses less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058210" comment="php5-odbc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058211" comment="php5-openssl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058212" comment="php5-pcntl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058213" comment="php5-pdo less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058214" comment="php5-pear less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058215" comment="php5-pgsql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058216" comment="php5-posix less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058217" comment="php5-pspell less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058218" comment="php5-readline less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058219" comment="php5-shmop less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058220" comment="php5-snmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058221" comment="php5-soap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058222" comment="php5-sockets less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058223" comment="php5-sqlite less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058224" comment="php5-suhosin less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058225" comment="php5-sysvmsg less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058226" comment="php5-sysvsem less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058227" comment="php5-sysvshm less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058228" comment="php5-tidy less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058229" comment="php5-tokenizer less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058230" comment="php5-wddx less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058231" comment="php5-xmlreader less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058232" comment="php5-xmlrpc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058233" comment="php5-xmlwriter less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058234" comment="php5-xsl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058235" comment="php5-zip less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058236" comment="php5-zlib less than 5.2.12-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5824</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5824" source="CVE"/>
	<description>
	Heap-based buffer overflow in msadpcm.c in libaudiofile in audiofile 0.2.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WAV file.
	</description>
 </metadata>
<!-- 2992a8c985944148b6def71a35d49505 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051568" comment="audiofile-32bit less than 0.2.6-140.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051569" comment="audiofile-64bit less than 0.2.6-140.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051570" comment="audiofile-devel less than 0.2.6-140.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051571" comment="audiofile less than 0.2.6-140.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5902</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5902" source="CVE"/>
	<description>
	Buffer overflow in the xrdp_bitmap_invalidate function in xrdp/xrdp_bitmap.c in xrdp 0.4.1 and earlier allows remote attackers to execute arbitrary code via a crafted request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07e887637bb42e660a8d1d54645a14e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051572" comment="xrdp less than 0.4.1-16.6.2"/>
	</criteria>
	<!-- f35238fa0e8ecf1470a2b483f2e8c46e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051573" comment="xrdp less than 0.4.1-16.7.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5903</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5903" source="CVE"/>
	<description>
	Array index error in the xrdp_bitmap_def_proc function in xrdp/funcs.c in xrdp 0.4.1 and earlier allows remote attackers to execute arbitrary code via vectors that manipulate the value of the edit_pos structure member.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07e887637bb42e660a8d1d54645a14e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051572" comment="xrdp less than 0.4.1-16.6.2"/>
	</criteria>
	<!-- f35238fa0e8ecf1470a2b483f2e8c46e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051573" comment="xrdp less than 0.4.1-16.7.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5904</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5904" source="CVE"/>
	<description>
	The rdp_rdp_process_color_pointer_pdu function in rdp/rdp_rdp.c in xrdp 0.4.1 and earlier allows remote RDP servers to have an unknown impact via input data that sets crafted values for certain length variables, leading to a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07e887637bb42e660a8d1d54645a14e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051572" comment="xrdp less than 0.4.1-16.6.2"/>
	</criteria>
	<!-- f35238fa0e8ecf1470a2b483f2e8c46e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051573" comment="xrdp less than 0.4.1-16.7.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5907</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5907" source="CVE"/>
	<description>
	The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer.  NOTE: some sources incorrectly report this as a double free vulnerability.
	</description>
 </metadata>
<!-- 1297a482a7160ae9a4d459d657512149 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051581" comment="libpng-devel-32bit less than 1.2.31-4.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051582" comment="libpng-devel-64bit less than 1.2.31-4.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051583" comment="libpng-devel less than 1.2.31-4.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051584" comment="libpng12-0-32bit less than 1.2.31-4.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051585" comment="libpng12-0-64bit less than 1.2.31-4.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051586" comment="libpng12-0 less than 1.2.31-4.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051587" comment="libpng3 less than 1.2.31-4.35.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5913</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-5913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5913" source="CVE"/>
	<description>
	The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."
	</description>
 </metadata>
<!-- 53b9f1d7a183738f7384e1ca35aa996b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061221" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061222" comment="MozillaFirefox-translations-common less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061223" comment="MozillaFirefox-translations-other less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061224" comment="MozillaFirefox less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061225" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061226" comment="mozilla-xulrunner191-devel less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061227" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061228" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061229" comment="mozilla-xulrunner191-translations-common less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061230" comment="mozilla-xulrunner191-translations-other less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061231" comment="mozilla-xulrunner191 less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061232" comment="python-xpcom191 less than 1.9.1.10-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6123</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-6123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6123" source="CVE"/>
	<description>
	The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp 5.0.9 through 5.4.2.1, when using TCP wrappers for client authorization, does not properly parse hosts.allow rules, which allows remote attackers to bypass intended access restrictions and execute SNMP queries, related to "source/destination IP address confusion."
	</description>
 </metadata>
<!-- 0ad0b2d78cf31f47b77f069596392978 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051603" comment="libsnmp15-32bit less than 5.4.2.1-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051604" comment="libsnmp15-64bit less than 5.4.2.1-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051605" comment="libsnmp15 less than 5.4.2.1-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051606" comment="net-snmp-devel less than 5.4.2.1-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051607" comment="net-snmp less than 5.4.2.1-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051608" comment="perl-SNMP less than 5.4.2.1-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051609" comment="snmp-mibs less than 5.4.2.1-5.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6235</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-6235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6235" source="CVE"/>
	<description>
	The Netrw plugin (netrw.vim) in Vim 7.0 and 7.1 allows user-assisted attackers to execute arbitrary commands via shell metacharacters in a filename used by the (1) "D" (delete) command or (2) b:netrw_curdir variable, as demonstrated using the netrw.v4 and netrw.v5 test cases.
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049359" comment="gvim less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049360" comment="vim-base less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049361" comment="vim-data less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049362" comment="vim-enhanced less than 7.2-7.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6393</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-6393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6393" source="CVE"/>
	<description>
	PSI Jabber client before 0.12.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a file transfer request with a negative value in a SOCKS5 option, which bypasses a signed integer check and triggers an integer overflow and a heap-based buffer overflow.
	</description>
 </metadata>
<!-- b4f0fdeff4de0c2f5d70187fa57f487f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051618" comment="psi less than 0.12-28.15.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6514</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-6514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6514" source="CVE"/>
	<description>
	The Expo plugin in Compiz Fusion 0.7.8 allows local users with physical access to drag the screen saver aside and access the locked desktop by using Expo mouse shortcuts, a related issue to CVE-2007-3920.
	</description>
 </metadata>
<!-- 831b6641ffa4f219393941fcbce13b64 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059201" comment="compiz-fusion-plugins-main-devel less than 0.7.8-4.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059202" comment="compiz-fusion-plugins-main less than 0.7.8-4.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6679</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-6679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6679" source="CVE"/>
	<description>
	Buffer overflow in the BaseFont writer module in Ghostscript 8.62, and possibly other versions, allows remote attackers to cause a denial of service (ps2pdf crash) and possibly execute arbitrary code via a crafted Postscript file.
	</description>
 </metadata>
<!-- fdc70560402b44cb7ce9829765211428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047631" comment="ghostscript-devel less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047632" comment="ghostscript-fonts-other less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047633" comment="ghostscript-fonts-rus less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047634" comment="ghostscript-fonts-std less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047635" comment="ghostscript-ijs-devel less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047636" comment="ghostscript-library less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047637" comment="ghostscript-omni less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047638" comment="ghostscript-x11 less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047639" comment="libgimpprint-devel less than 4.2.7-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047640" comment="libgimpprint less than 4.2.7-31.43.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6680</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-6680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6680" source="CVE"/>
	<description>
	libclamav/pe.c in ClamAV before 0.95 allows remote attackers to cause a denial of service (crash) via a crafted EXE file that triggers a divide-by-zero error.
	</description>
 </metadata>
<!-- 948121c661973e0f48957c2eceb4541a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051620" comment="clamav-db less than 0.95-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032190" comment="clamav less than 0.95-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7159</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-7159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7159" source="CVE"/>
	<description>
	The silc_asn1_encoder function in lib/silcasn1/silcasn1_encode.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.8 allows remote attackers to overwrite a stack location and possibly execute arbitrary code via a crafted OID value, related to incorrect use of a %lu format string.
	</description>
 </metadata>
<!-- a1d993f6a0398f2c0b4e0ce65a7cf70e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054846" comment="silc-toolkit-devel less than 1.1.7-7.66.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054847" comment="silc-toolkit less than 1.1.7-7.66.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7160</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-7160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7160" source="CVE"/>
	<description>
	The silc_http_server_parse function in lib/silchttp/silchttpserver.c in the internal HTTP server in silcd in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.9 allows remote attackers to overwrite a stack location and possibly execute arbitrary code via a crafted Content-Length header, related to incorrect use of a %lu format string.
	</description>
 </metadata>
<!-- a1d993f6a0398f2c0b4e0ce65a7cf70e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054846" comment="silc-toolkit-devel less than 1.1.7-7.66.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054847" comment="silc-toolkit less than 1.1.7-7.66.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7247</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-7247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7247" source="CVE"/>
	<description>
	sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 12e230ba4d3ac5675fafc99e08709091 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060105" comment="libmysqlclient-devel less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060106" comment="libmysqlclient15-32bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060107" comment="libmysqlclient15-64bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060108" comment="libmysqlclient15 less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060109" comment="libmysqlclient_r15-32bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060110" comment="libmysqlclient_r15-64bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060111" comment="libmysqlclient_r15 less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060112" comment="mysql-Max less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060113" comment="mysql-bench less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060114" comment="mysql-client less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060115" comment="mysql-debug less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060116" comment="mysql-test less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060117" comment="mysql-tools less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060118" comment="mysql less than 5.0.67-12.17.7"/>
		</criteria>
	</criteria>
	<!-- 74ffcb3d975f99b39204a9a17088e978 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060119" comment="libmysqlclient-devel less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060120" comment="libmysqlclient15-32bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060121" comment="libmysqlclient15-64bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060122" comment="libmysqlclient15 less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060123" comment="libmysqlclient_r15-32bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060124" comment="libmysqlclient_r15-64bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060125" comment="libmysqlclient_r15 less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060126" comment="mysql-Max less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060127" comment="mysql-bench less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060128" comment="mysql-client less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060129" comment="mysql-debug less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060130" comment="mysql-test less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060131" comment="mysql-tools less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060132" comment="mysql less than 5.0.67-12.17.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7248</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2008-7248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7248" source="CVE"/>
	<description>
	Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.
	</description>
 </metadata>
<!-- 0bfaefbdb6c0ab07ac0ab7a691cdb5d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058550" comment="rubygem-actionpack-2_1 less than 2.1.1-2.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058551" comment="rubygem-actionpack less than 2.1.1-2.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0021</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021" source="CVE"/>
	<description>
	NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
<!-- c12520ca529dbde2351ff541d4852044 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051625" comment="ntp-doc less than 4.2.4p5-15.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051626" comment="ntp less than 4.2.4p5-15.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0022</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022" source="CVE"/>
	<description>
	Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aba3a52238dabac82fa8decba6d5c778 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009050661" comment="cifs-mount less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050662" comment="ldapsmb less than 1.34b-5.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050663" comment="libnetapi-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050664" comment="libnetapi0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050665" comment="libsmbclient-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050666" comment="libsmbclient0-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050667" comment="libsmbclient0-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050668" comment="libsmbclient0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050669" comment="libsmbsharemodes-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050670" comment="libsmbsharemodes0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050671" comment="libtalloc-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050672" comment="libtalloc1-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050673" comment="libtalloc1-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050674" comment="libtalloc1 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050675" comment="libtdb-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050676" comment="libtdb1-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050677" comment="libtdb1-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050678" comment="libtdb1 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050679" comment="libwbclient-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050680" comment="libwbclient0-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050681" comment="libwbclient0-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050682" comment="libwbclient0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050683" comment="samba-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050684" comment="samba-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050685" comment="samba-client-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050686" comment="samba-client-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050687" comment="samba-client less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050688" comment="samba-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050689" comment="samba-krb-printing less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050690" comment="samba-vscan less than 0.3.6b-5.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050691" comment="samba-winbind-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050692" comment="samba-winbind-64bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050693" comment="samba-winbind less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050694" comment="samba less than 3.2.6-0.3.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111-debug is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009050661" comment="cifs-mount less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050662" comment="ldapsmb less than 1.34b-5.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050663" comment="libnetapi-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050664" comment="libnetapi0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050665" comment="libsmbclient-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050666" comment="libsmbclient0-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050668" comment="libsmbclient0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050669" comment="libsmbsharemodes-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050670" comment="libsmbsharemodes0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050671" comment="libtalloc-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050672" comment="libtalloc1-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050674" comment="libtalloc1 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050675" comment="libtdb-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050676" comment="libtdb1-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050678" comment="libtdb1 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050679" comment="libwbclient-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050680" comment="libwbclient0-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050682" comment="libwbclient0 less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050683" comment="samba-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050685" comment="samba-client-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050687" comment="samba-client less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050688" comment="samba-devel less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050689" comment="samba-krb-printing less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050690" comment="samba-vscan less than 0.3.6b-5.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050691" comment="samba-winbind-32bit less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050693" comment="samba-winbind less than 3.2.6-0.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009050694" comment="samba less than 3.2.6-0.3.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d11e16275915a8d91096a5c200deea60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050661" comment="cifs-mount less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050695" comment="keyutils less than 1.2-107.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050696" comment="keyutils less than 1.2-107.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050662" comment="ldapsmb less than 1.34b-5.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050663" comment="libnetapi-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050664" comment="libnetapi0 less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050665" comment="libsmbclient-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050666" comment="libsmbclient0-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050667" comment="libsmbclient0-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050668" comment="libsmbclient0 less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050669" comment="libsmbsharemodes-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050670" comment="libsmbsharemodes0 less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050671" comment="libtalloc-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050672" comment="libtalloc1-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050673" comment="libtalloc1-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050674" comment="libtalloc1 less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050675" comment="libtdb-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050676" comment="libtdb1-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050677" comment="libtdb1-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050678" comment="libtdb1 less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050679" comment="libwbclient-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050680" comment="libwbclient0-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050681" comment="libwbclient0-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050682" comment="libwbclient0 less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050683" comment="samba-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050684" comment="samba-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050685" comment="samba-client-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050686" comment="samba-client-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050687" comment="samba-client less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050688" comment="samba-devel less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050689" comment="samba-krb-printing less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050690" comment="samba-vscan less than 0.3.6b-5.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050691" comment="samba-winbind-32bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050692" comment="samba-winbind-64bit less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050693" comment="samba-winbind less than 3.2.6-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050694" comment="samba less than 3.2.6-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0023</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023" source="CVE"/>
	<description>
	The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.
	</description>
 </metadata>
<!-- 9d2407b0352245ff49a54784986b83a9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053421" comment="libapr-util1-dbd-mysql less than 1.3.4-13.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053422" comment="libapr-util1-dbd-pgsql less than 1.3.4-13.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053423" comment="libapr-util1-dbd-sqlite3 less than 1.3.4-13.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053424" comment="libapr-util1-devel less than 1.3.4-13.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053425" comment="libapr-util1 less than 1.3.4-13.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0025</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025" source="CVE"/>
	<description>
	BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
<!-- 5c696f1a00acd08086f59287bdbfb6fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051636" comment="bind-chrootenv less than 9.5.0P2-17.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051637" comment="bind-devel less than 9.5.0P2-17.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051638" comment="bind-doc less than 9.5.0P2-17.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051639" comment="bind-libs-32bit less than 9.5.0P2-17.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051640" comment="bind-libs-64bit less than 9.5.0P2-17.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051641" comment="bind-libs less than 9.5.0P2-17.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051642" comment="bind-utils less than 9.5.0P2-17.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051643" comment="bind less than 9.5.0P2-17.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0028</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0028" source="CVE"/>
	<description>
	The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
	</description>
 </metadata>
<!-- d43c750889c7750653f9465722a4aa13 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051055" comment="kernel-debug-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051056" comment="kernel-debug-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051057" comment="kernel-debug less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051058" comment="kernel-default-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051059" comment="kernel-default-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051060" comment="kernel-default less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051061" comment="kernel-docs less than 2.6.3-3.13.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051062" comment="kernel-kdump less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051063" comment="kernel-pae-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051064" comment="kernel-pae-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051065" comment="kernel-pae less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051066" comment="kernel-ppc64-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051067" comment="kernel-ppc64-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051068" comment="kernel-ppc64 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051069" comment="kernel-ps3 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051070" comment="kernel-source less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051071" comment="kernel-syms less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051072" comment="kernel-trace-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051073" comment="kernel-trace-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051074" comment="kernel-trace less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051075" comment="kernel-vanilla less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051076" comment="kernel-xen-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051077" comment="kernel-xen-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051078" comment="kernel-xen less than 2.6.27.19-3.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0029</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0029" source="CVE"/>
	<description>
	The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service (crash) or possibly gain privileges via a crafted system call.
	</description>
 </metadata>
<!-- d43c750889c7750653f9465722a4aa13 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051055" comment="kernel-debug-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051056" comment="kernel-debug-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051057" comment="kernel-debug less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051058" comment="kernel-default-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051059" comment="kernel-default-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051060" comment="kernel-default less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051061" comment="kernel-docs less than 2.6.3-3.13.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051062" comment="kernel-kdump less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051063" comment="kernel-pae-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051064" comment="kernel-pae-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051065" comment="kernel-pae less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051066" comment="kernel-ppc64-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051067" comment="kernel-ppc64-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051068" comment="kernel-ppc64 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051069" comment="kernel-ps3 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051070" comment="kernel-source less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051071" comment="kernel-syms less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051072" comment="kernel-trace-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051073" comment="kernel-trace-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051074" comment="kernel-trace less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051075" comment="kernel-vanilla less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051076" comment="kernel-xen-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051077" comment="kernel-xen-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051078" comment="kernel-xen less than 2.6.27.19-3.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0031</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0031" source="CVE"/>
	<description>
	Memory leak in the keyctl_join_session_keyring function (security/keys/keyctl.c) in Linux kernel 2.6.29-rc2 and earlier allows local users to cause a denial of service (kernel memory consumption) via unknown vectors related to a "missing kfree."
	</description>
 </metadata>
<!-- d43c750889c7750653f9465722a4aa13 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051055" comment="kernel-debug-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051056" comment="kernel-debug-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051057" comment="kernel-debug less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051058" comment="kernel-default-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051059" comment="kernel-default-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051060" comment="kernel-default less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051061" comment="kernel-docs less than 2.6.3-3.13.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051062" comment="kernel-kdump less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051063" comment="kernel-pae-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051064" comment="kernel-pae-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051065" comment="kernel-pae less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051066" comment="kernel-ppc64-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051067" comment="kernel-ppc64-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051068" comment="kernel-ppc64 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051069" comment="kernel-ps3 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051070" comment="kernel-source less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051071" comment="kernel-syms less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051072" comment="kernel-trace-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051073" comment="kernel-trace-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051074" comment="kernel-trace less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051075" comment="kernel-vanilla less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051076" comment="kernel-xen-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051077" comment="kernel-xen-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051078" comment="kernel-xen less than 2.6.27.19-3.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0033</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0033" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0033" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
	</description>
 </metadata>
<!-- 654c73dbf6fd8c8fee7aa6bef342dba6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051437" comment="tomcat6-admin-webapps less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051438" comment="tomcat6-docs-webapp less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051439" comment="tomcat6-javadoc less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051440" comment="tomcat6-jsp-2_1-api less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051441" comment="tomcat6-lib less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051442" comment="tomcat6-servlet-2_5-api less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051443" comment="tomcat6-webapps less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051444" comment="tomcat6 less than 6.0.18-16.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0034</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0034" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0034" source="CVE"/>
	<description>
	parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.
	</description>
 </metadata>
<!-- a8f3c364afbdcae1420bf6c13dab2c7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051687" comment="sudo less than 1.6.9p17-10.36.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0037</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037" source="CVE"/>
	<description>
	The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.
	</description>
 </metadata>
<!-- 2321d30d371b0fa595359e20f7ce3f3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051693" comment="curl less than 7.19.0-11.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051694" comment="libcurl-devel less than 7.19.0-11.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051695" comment="libcurl4-32bit less than 7.19.0-11.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051696" comment="libcurl4-64bit less than 7.19.0-11.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051697" comment="libcurl4 less than 7.19.0-11.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0040</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040" source="CVE"/>
	<description>
	The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a0ace5bcb5c64459ee40daf739ec42e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051722" comment="libpng-devel-32bit less than 1.2.31-4.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051723" comment="libpng-devel-64bit less than 1.2.31-4.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051724" comment="libpng-devel less than 1.2.31-4.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051725" comment="libpng12-0-32bit less than 1.2.31-4.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051726" comment="libpng12-0-64bit less than 1.2.31-4.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051727" comment="libpng12-0 less than 1.2.31-4.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051728" comment="libpng3 less than 1.2.31-4.37.1"/>
		</criteria>
	</criteria>
	<!-- af3b4d9fa7bc176fdabe13c7e21a5c64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051741" comment="MozillaFirefox-branding-upstream less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051742" comment="MozillaFirefox-translations less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051743" comment="MozillaFirefox less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051744" comment="mozilla-xulrunner190-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051745" comment="mozilla-xulrunner190-devel less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051746" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051747" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051748" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051749" comment="mozilla-xulrunner190-translations less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051750" comment="mozilla-xulrunner190 less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051751" comment="python-xpcom190 less than 1.9.0.7-1.2.2"/>
		</criteria>
	</criteria>
	<!-- b19b2e1ea42ada5a9dadfc729517ae69 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051759" comment="libpng-devel-32bit less than 1.2.31-4.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051760" comment="libpng-devel-64bit less than 1.2.31-4.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051761" comment="libpng-devel less than 1.2.31-4.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051762" comment="libpng12-0-32bit less than 1.2.31-4.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051763" comment="libpng12-0-64bit less than 1.2.31-4.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051764" comment="libpng12-0 less than 1.2.31-4.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051765" comment="libpng3 less than 1.2.31-4.36.1"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051780" comment="seamonkey-dom-inspector less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051781" comment="seamonkey-irc less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051782" comment="seamonkey-mail less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051783" comment="seamonkey-spellchecker less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051784" comment="seamonkey-venkman less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051785" comment="seamonkey less than 1.1.16-1.1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0049</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0049" source="CVE"/>
	<description>
	Belgian eID middleware (eidlib) 2.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
<!-- 05c24508b48c6d37bc55ef2ebd8caf3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051787" comment="eID-belgium less than 2.6.0-121.29.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0065</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0065" source="CVE"/>
	<description>
	Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.28-git8 allows remote attackers to have an unknown impact via an FWD-TSN (aka FORWARD-TSN) chunk with a large stream ID.
	</description>
 </metadata>
<!-- d43c750889c7750653f9465722a4aa13 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051055" comment="kernel-debug-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051056" comment="kernel-debug-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051057" comment="kernel-debug less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051058" comment="kernel-default-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051059" comment="kernel-default-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051060" comment="kernel-default less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051061" comment="kernel-docs less than 2.6.3-3.13.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051062" comment="kernel-kdump less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051063" comment="kernel-pae-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051064" comment="kernel-pae-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051065" comment="kernel-pae less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051066" comment="kernel-ppc64-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051067" comment="kernel-ppc64-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051068" comment="kernel-ppc64 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051069" comment="kernel-ps3 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051070" comment="kernel-source less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051071" comment="kernel-syms less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051072" comment="kernel-trace-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051073" comment="kernel-trace-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051074" comment="kernel-trace less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051075" comment="kernel-vanilla less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051076" comment="kernel-xen-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051077" comment="kernel-xen-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051078" comment="kernel-xen less than 2.6.27.19-3.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0114</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0114" source="CVE"/>
	<description>
	Unspecified vulnerability in the Settings Manager in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87, and possibly other versions, allows remote attackers to trick a user into visiting an arbitrary URL via unknown vectors, related to "a potential Clickjacking issue variant."
	</description>
 </metadata>
<!-- 31b49f5e5d89220061c13b7ea115b027 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051790" comment="flash-player less than 10.0.22.87-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0115</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0115" source="CVE"/>
	<description>
	The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, SUSE Linux Enterprise Server (SLES), Fedora, and possibly other operating systems, uses world-writable permissions for the socket file (aka /var/run/multipathd.sock), which allows local users to send arbitrary commands to the multipath daemon.
	</description>
 </metadata>
<!-- 44481118bd668d73c9424a8b6fa812a1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051795" comment="kpartx less than 0.4.8-26.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051796" comment="multipath-tools less than 0.4.8-26.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0126</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0126" source="CVE"/>
	<description>
	The decrypt_public function in lib/crypt.cpp in the client in Berkeley Open Infrastructure for Network Computing (BOINC) 6.2.14 and 6.4.5 does not check the return value from the OpenSSL RSA_public_decrypt function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
<!-- 765d0f597ec4374f8e4a7066d1bba8bc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051799" comment="boinc-client-devel less than 6.2.18-2.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051800" comment="boinc-client less than 6.2.18-2.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051801" comment="boinc-gui-lang less than 6.2.18-2.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051802" comment="boinc-gui less than 6.2.18-2.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0135</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0135" source="CVE"/>
	<description>
	Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 0806404c60fc84726fc594d21e6de419 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051808" comment="amarok-lang less than 1.4.10-26.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051809" comment="amarok-libvisual less than 1.4.10-26.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051810" comment="amarok-xine less than 1.4.10-26.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051811" comment="amarok-yauap less than 1.4.10-26.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051812" comment="amarok less than 1.4.10-26.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0136</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0136" source="CVE"/>
	<description>
	Multiple array index errors in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via an Audible Audio (.aa) file with a crafted (1) nlen or (2) vlen Tag value, each of which can lead to an invalid pointer dereference, or the writing of a 0x00 byte to an arbitrary memory location, after an allocation failure.
	</description>
 </metadata>
<!-- 0806404c60fc84726fc594d21e6de419 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051808" comment="amarok-lang less than 1.4.10-26.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051809" comment="amarok-libvisual less than 1.4.10-26.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051810" comment="amarok-xine less than 1.4.10-26.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051811" comment="amarok-yauap less than 1.4.10-26.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051812" comment="amarok less than 1.4.10-26.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0146</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146" source="CVE"/>
	<description>
	Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8ab5ee5635df09064e67724be43217 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051818" comment="libpoppler4 less than 0.10.1-1.6.10"/>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051830" comment="kdegraphics3-3D less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051831" comment="kdegraphics3-devel less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051832" comment="kdegraphics3-extra less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051833" comment="kdegraphics3-fax less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051834" comment="kdegraphics3-imaging less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051835" comment="kdegraphics3-kamera less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051836" comment="kdegraphics3-pdf less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051837" comment="kdegraphics3-postscript less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051838" comment="kdegraphics3-scan less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051839" comment="kdegraphics3-tex less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051840" comment="kdegraphics3 less than 3.5.10-1.63.2"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051854" comment="xpdf-tools less than 3.02-97.78.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051855" comment="xpdf less than 3.02-97.78.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0147</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147" source="CVE"/>
	<description>
	Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8ab5ee5635df09064e67724be43217 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051818" comment="libpoppler4 less than 0.10.1-1.6.10"/>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051830" comment="kdegraphics3-3D less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051831" comment="kdegraphics3-devel less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051832" comment="kdegraphics3-extra less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051833" comment="kdegraphics3-fax less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051834" comment="kdegraphics3-imaging less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051835" comment="kdegraphics3-kamera less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051836" comment="kdegraphics3-pdf less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051837" comment="kdegraphics3-postscript less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051838" comment="kdegraphics3-scan less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051839" comment="kdegraphics3-tex less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051840" comment="kdegraphics3 less than 3.5.10-1.63.2"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051854" comment="xpdf-tools less than 3.02-97.78.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051855" comment="xpdf less than 3.02-97.78.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0153</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0153" source="CVE"/>
	<description>
	International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.
	</description>
 </metadata>
<!-- 0a8fa59efa6b7fc211ab1d34c839c21d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053874" comment="icu-data less than 4.0-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053875" comment="icu less than 4.0-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053876" comment="libicu-32bit less than 4.0-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053877" comment="libicu-64bit less than 4.0-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053878" comment="libicu-devel-32bit less than 4.0-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053879" comment="libicu-devel-64bit less than 4.0-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053880" comment="libicu-devel less than 4.0-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053881" comment="libicu-doc less than 4.0-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053882" comment="libicu less than 4.0-7.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0159</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159" source="CVE"/>
	<description>
	Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
	</description>
 </metadata>
<!-- bb0b4578b3b2bd90c300579ef5555ae9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051872" comment="ntp-doc less than 4.2.4p6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051873" comment="ntp less than 4.2.4p6-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0163</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163" source="CVE"/>
	<description>
	Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 04a336424d7208ee8d374a60106a3c70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051880" comment="cups-client less than 1.3.9-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051881" comment="cups-devel less than 1.3.9-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051882" comment="cups-libs-32bit less than 1.3.9-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051883" comment="cups-libs-64bit less than 1.3.9-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051884" comment="cups-libs less than 1.3.9-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051885" comment="cups less than 1.3.9-7.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0165</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165" source="CVE"/>
	<description>
	Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to "g*allocn."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8ab5ee5635df09064e67724be43217 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051818" comment="libpoppler4 less than 0.10.1-1.6.10"/>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051830" comment="kdegraphics3-3D less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051831" comment="kdegraphics3-devel less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051832" comment="kdegraphics3-extra less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051833" comment="kdegraphics3-fax less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051834" comment="kdegraphics3-imaging less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051835" comment="kdegraphics3-kamera less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051836" comment="kdegraphics3-pdf less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051837" comment="kdegraphics3-postscript less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051838" comment="kdegraphics3-scan less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051839" comment="kdegraphics3-tex less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051840" comment="kdegraphics3 less than 3.5.10-1.63.2"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051854" comment="xpdf-tools less than 3.02-97.78.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051855" comment="xpdf less than 3.02-97.78.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0166</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a free of uninitialized memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8ab5ee5635df09064e67724be43217 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051818" comment="libpoppler4 less than 0.10.1-1.6.10"/>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051830" comment="kdegraphics3-3D less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051831" comment="kdegraphics3-devel less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051832" comment="kdegraphics3-extra less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051833" comment="kdegraphics3-fax less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051834" comment="kdegraphics3-imaging less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051835" comment="kdegraphics3-kamera less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051836" comment="kdegraphics3-pdf less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051837" comment="kdegraphics3-postscript less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051838" comment="kdegraphics3-scan less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051839" comment="kdegraphics3-tex less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051840" comment="kdegraphics3 less than 3.5.10-1.63.2"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051854" comment="xpdf-tools less than 3.02-97.78.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051855" comment="xpdf less than 3.02-97.78.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0179</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0179" source="CVE"/>
	<description>
	libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.
	</description>
 </metadata>
<!-- 483cd936b357a16ed8cf98eb89cf66bb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047601" comment="libmikmod-32bit less than 3.1.11a-71.56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047602" comment="libmikmod-64bit less than 3.1.11a-71.56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047603" comment="libmikmod-devel less than 3.1.11a-71.56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047604" comment="libmikmod less than 3.1.11a-71.56.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0186</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0186" source="CVE"/>
	<description>
	Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 0201aad425f51ee855306ce4675664c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051893" comment="libsndfile-32bit less than 1.0.17-171.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051894" comment="libsndfile-64bit less than 1.0.17-171.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051895" comment="libsndfile-devel less than 1.0.17-171.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051896" comment="libsndfile-octave less than 1.0.17-171.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051897" comment="libsndfile-progs less than 1.0.17-171.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051898" comment="libsndfile less than 1.0.17-171.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0193</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0193" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Acrobat Reader 9 before 9.1, 8 before 8.1.4, and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a PDF file with a malformed JBIG2 symbol dictionary segment, a different vulnerability than CVE-2009-1061 and CVE-2009-1062.
	</description>
 </metadata>
<!-- 03e82aa4432227738e571f5f8f20efc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051905" comment="acroread less than 8.1.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0196</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0196" source="CVE"/>
	<description>
	Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.
	</description>
 </metadata>
<!-- fdc70560402b44cb7ce9829765211428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047631" comment="ghostscript-devel less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047632" comment="ghostscript-fonts-other less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047633" comment="ghostscript-fonts-rus less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047634" comment="ghostscript-fonts-std less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047635" comment="ghostscript-ijs-devel less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047636" comment="ghostscript-library less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047637" comment="ghostscript-omni less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047638" comment="ghostscript-x11 less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047639" comment="libgimpprint-devel less than 4.2.7-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047640" comment="libgimpprint less than 4.2.7-31.43.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0198</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0198" source="CVE"/>
	<description>
	Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF file that contains JBIG2 text region segments with Huffman encoding.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051914" comment="acroread less than 8.1.6-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0200</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0200" source="CVE"/>
	<description>
	Integer underflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 22b1a4197bffe98b3a0406f091c440e2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054593" comment="OpenOffice_org-math less than 3.0.0.9-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054594" comment="OpenOffice_org-writer-devel less than 3.0.0.9-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054595" comment="OpenOffice_org-writer-l10n-prebuilt less than 3.0.0.9-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054596" comment="OpenOffice_org-writer less than 3.0.0.9-2.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0201</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0201" source="CVE"/>
	<description>
	Heap-based buffer overflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document, related to "table parsing."
	</description>
 </metadata>
<!-- 22b1a4197bffe98b3a0406f091c440e2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054593" comment="OpenOffice_org-math less than 3.0.0.9-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054594" comment="OpenOffice_org-writer-devel less than 3.0.0.9-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054595" comment="OpenOffice_org-writer-l10n-prebuilt less than 3.0.0.9-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054596" comment="OpenOffice_org-writer less than 3.0.0.9-2.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0217</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217" source="CVE"/>
	<description>
	The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9aa2fb176579b8330d78ce7638e832eb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058871" comment="OpenOffice_org-base-drivers-postgresql less than 3.0.0.9-1.11.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058872" comment="OpenOffice_org-gnome less than 3.0.0.9-1.11.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058873" comment="OpenOffice_org-kde less than 3.0.0.9-1.11.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058874" comment="OpenOffice_org-libs-core-devel less than 3.0.0.9-1.11.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058875" comment="OpenOffice_org-libs-core-l10n-prebuilt less than 3.0.0.9-1.11.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058876" comment="OpenOffice_org-libs-core less than 3.0.0.9-1.11.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058877" comment="OpenOffice_org-libs-extern-devel less than 3.0.0.9-1.15.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058878" comment="OpenOffice_org-libs-extern-l10n-prebuilt less than 3.0.0.9-1.15.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058879" comment="OpenOffice_org-libs-extern less than 3.0.0.9-1.15.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058880" comment="OpenOffice_org-libs-gui-devel less than 3.0.0.9-1.12.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058881" comment="OpenOffice_org-libs-gui-l10n-prebuilt less than 3.0.0.9-1.12.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058882" comment="OpenOffice_org-libs-gui less than 3.0.0.9-1.12.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058883" comment="OpenOffice_org-mailmerge less than 3.0.0.9-1.11.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058884" comment="OpenOffice_org-math less than 3.0.0.9-2.9.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058885" comment="OpenOffice_org-writer-devel less than 3.0.0.9-2.9.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058886" comment="OpenOffice_org-writer-l10n-prebuilt less than 3.0.0.9-2.9.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058887" comment="OpenOffice_org-writer less than 3.0.0.9-2.9.16"/>
		</criteria>
	</criteria>
	<!-- ba41b676c39b719fa82afb950dfb8541 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054457" comment="java-1_6_0-openjdk-demo less than 1.5.1_b16-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054458" comment="java-1_6_0-openjdk-devel less than 1.5.1_b16-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054459" comment="java-1_6_0-openjdk-javadoc less than 1.5.1_b16-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054460" comment="java-1_6_0-openjdk-plugin less than 1.5.1_b16-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054461" comment="java-1_6_0-openjdk-src less than 1.5.1_b16-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054462" comment="java-1_6_0-openjdk less than 1.5.1_b16-0.1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0241</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0241" source="CVE"/>
	<description>
	Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.
	</description>
 </metadata>
<!-- 8f6baba203b545345b58590ab71c754b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051920" comment="ganglia-monitor-core-devel less than 2.5.7-172.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051921" comment="ganglia-monitor-core-gmetad less than 2.5.7-172.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051922" comment="ganglia-monitor-core-gmond less than 2.5.7-172.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051923" comment="ganglia-monitor-core less than 2.5.7-172.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051924" comment="ganglia-webfrontend less than 2.5.7-172.40.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0269</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0269" source="CVE"/>
	<description>
	fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 2.6.28.1 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, leading to use of a -1 return value as an array index.
	</description>
 </metadata>
<!-- d43c750889c7750653f9465722a4aa13 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051055" comment="kernel-debug-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051056" comment="kernel-debug-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051057" comment="kernel-debug less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051058" comment="kernel-default-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051059" comment="kernel-default-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051060" comment="kernel-default less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051061" comment="kernel-docs less than 2.6.3-3.13.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051062" comment="kernel-kdump less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051063" comment="kernel-pae-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051064" comment="kernel-pae-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051065" comment="kernel-pae less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051066" comment="kernel-ppc64-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051067" comment="kernel-ppc64-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051068" comment="kernel-ppc64 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051069" comment="kernel-ps3 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051070" comment="kernel-source less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051071" comment="kernel-syms less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051072" comment="kernel-trace-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051073" comment="kernel-trace-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051074" comment="kernel-trace less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051075" comment="kernel-vanilla less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051076" comment="kernel-xen-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051077" comment="kernel-xen-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051078" comment="kernel-xen less than 2.6.27.19-3.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0313</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0313" source="CVE"/>
	<description>
	winetricks before 20081223 allows local users to overwrite arbitrary files via a symlink attack on the x_showmenu.txt temporary file.
	</description>
 </metadata>
<!-- f9dab72d10024af73e3d7372dc769624 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051929" comment="wine-devel less than 1.1.9-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051930" comment="wine less than 1.1.9-1.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0316</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0316" source="CVE"/>
	<description>
	Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049359" comment="gvim less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049360" comment="vim-base less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049361" comment="vim-data less than 7.2-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049362" comment="vim-enhanced less than 7.2-7.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0322</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0322" source="CVE"/>
	<description>
	drivers/firmware/dell_rbu.c in the Linux kernel before 2.6.27.13, and 2.6.28.x before 2.6.28.2, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size file in /sys/devices/platform/dell_rbu/.
	</description>
 </metadata>
<!-- d43c750889c7750653f9465722a4aa13 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051055" comment="kernel-debug-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051056" comment="kernel-debug-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051057" comment="kernel-debug less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051058" comment="kernel-default-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051059" comment="kernel-default-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051060" comment="kernel-default less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051061" comment="kernel-docs less than 2.6.3-3.13.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051062" comment="kernel-kdump less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051063" comment="kernel-pae-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051064" comment="kernel-pae-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051065" comment="kernel-pae less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051066" comment="kernel-ppc64-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051067" comment="kernel-ppc64-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051068" comment="kernel-ppc64 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051069" comment="kernel-ps3 less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051070" comment="kernel-source less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051071" comment="kernel-syms less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051072" comment="kernel-trace-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051073" comment="kernel-trace-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051074" comment="kernel-trace less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051075" comment="kernel-vanilla less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051076" comment="kernel-xen-base less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051077" comment="kernel-xen-extra less than 2.6.27.19-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051078" comment="kernel-xen less than 2.6.27.19-3.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0352</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0352" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and destruction of arbitrary layout objects by the nsViewManager::Composite function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 930fe302e3c0b3f41065ecae160ac1ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051943" comment="MozillaFirefox-branding-upstream less than 3.0.6-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051944" comment="MozillaFirefox-translations less than 3.0.6-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051945" comment="MozillaFirefox less than 3.0.6-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051946" comment="mozilla-xulrunner190-32bit less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051947" comment="mozilla-xulrunner190-devel less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051948" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051949" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051950" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051951" comment="mozilla-xulrunner190-translations less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051952" comment="mozilla-xulrunner190 less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051953" comment="python-xpcom190 less than 1.9.0.6-0.1.1"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051780" comment="seamonkey-dom-inspector less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051781" comment="seamonkey-irc less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051782" comment="seamonkey-mail less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051783" comment="seamonkey-spellchecker less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051784" comment="seamonkey-venkman less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051785" comment="seamonkey less than 1.1.16-1.1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0353</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0353" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine.
	</description>
 </metadata>
<!-- 930fe302e3c0b3f41065ecae160ac1ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051943" comment="MozillaFirefox-branding-upstream less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051944" comment="MozillaFirefox-translations less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051945" comment="MozillaFirefox less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051946" comment="mozilla-xulrunner190-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051947" comment="mozilla-xulrunner190-devel less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051948" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051949" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051950" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051951" comment="mozilla-xulrunner190-translations less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051952" comment="mozilla-xulrunner190 less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051953" comment="python-xpcom190 less than 1.9.0.6-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0354</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0354" source="CVE"/>
	<description>
	Cross-domain vulnerability in js/src/jsobj.cpp in Mozilla Firefox 3.x before 3.0.6 allows remote attackers to bypass the Same Origin Policy, and access the properties of an arbitrary window and conduct cross-site scripting (XSS) attacks, via vectors involving a chrome XBL method and the window.eval function.
	</description>
 </metadata>
<!-- 930fe302e3c0b3f41065ecae160ac1ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051943" comment="MozillaFirefox-branding-upstream less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051944" comment="MozillaFirefox-translations less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051945" comment="MozillaFirefox less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051946" comment="mozilla-xulrunner190-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051947" comment="mozilla-xulrunner190-devel less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051948" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051949" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051950" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051951" comment="mozilla-xulrunner190-translations less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051952" comment="mozilla-xulrunner190 less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051953" comment="python-xpcom190 less than 1.9.0.6-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0355</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0355" source="CVE"/>
	<description>
	components/sessionstore/src/nsSessionStore.js in Mozilla Firefox before 3.0.6 does not block changes of INPUT elements to type="file" during tab restoration, which allows user-assisted remote attackers to read arbitrary files on a client machine via a crafted INPUT element.
	</description>
 </metadata>
<!-- 930fe302e3c0b3f41065ecae160ac1ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051943" comment="MozillaFirefox-branding-upstream less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051944" comment="MozillaFirefox-translations less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051945" comment="MozillaFirefox less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051946" comment="mozilla-xulrunner190-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051947" comment="mozilla-xulrunner190-devel less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051948" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051949" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051950" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051951" comment="mozilla-xulrunner190-translations less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051952" comment="mozilla-xulrunner190 less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051953" comment="python-xpcom190 less than 1.9.0.6-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0356</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0356" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.6 and SeaMonkey do not block links to the (1) about:plugins and (2) about:config URIs from .desktop files, which allows user-assisted remote attackers to bypass the Same Origin Policy and execute arbitrary code with chrome privileges via vectors involving the URL field in a Desktop Entry section of a .desktop file, related to representation of about: URIs as jar:file:// URIs.  NOTE: this issue exists because of an incomplete fix for CVE-2008-4582.
	</description>
 </metadata>
<!-- 930fe302e3c0b3f41065ecae160ac1ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051943" comment="MozillaFirefox-branding-upstream less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051944" comment="MozillaFirefox-translations less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051945" comment="MozillaFirefox less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051946" comment="mozilla-xulrunner190-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051947" comment="mozilla-xulrunner190-devel less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051948" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051949" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051950" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051951" comment="mozilla-xulrunner190-translations less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051952" comment="mozilla-xulrunner190 less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051953" comment="python-xpcom190 less than 1.9.0.6-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0357</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0357" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.6 and SeaMonkey before 1.1.15 do not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 930fe302e3c0b3f41065ecae160ac1ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051943" comment="MozillaFirefox-branding-upstream less than 3.0.6-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051944" comment="MozillaFirefox-translations less than 3.0.6-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051945" comment="MozillaFirefox less than 3.0.6-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051946" comment="mozilla-xulrunner190-32bit less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051947" comment="mozilla-xulrunner190-devel less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051948" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051949" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051950" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051951" comment="mozilla-xulrunner190-translations less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051952" comment="mozilla-xulrunner190 less than 1.9.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051953" comment="python-xpcom190 less than 1.9.0.6-0.1.1"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051780" comment="seamonkey-dom-inspector less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051781" comment="seamonkey-irc less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051782" comment="seamonkey-mail less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051783" comment="seamonkey-spellchecker less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051784" comment="seamonkey-venkman less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051785" comment="seamonkey less than 1.1.16-1.1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0358</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0358" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.6 does not properly implement the (1) no-store and (2) no-cache Cache-Control directives, which allows local users to obtain sensitive information by using the (a) back button or (b) history list of the victim's browser, as demonstrated by reading the response page of an https POST request.
	</description>
 </metadata>
<!-- 930fe302e3c0b3f41065ecae160ac1ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051943" comment="MozillaFirefox-branding-upstream less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051944" comment="MozillaFirefox-translations less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051945" comment="MozillaFirefox less than 3.0.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051946" comment="mozilla-xulrunner190-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051947" comment="mozilla-xulrunner190-devel less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051948" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051949" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051950" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051951" comment="mozilla-xulrunner190-translations less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051952" comment="mozilla-xulrunner190 less than 1.9.0.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051953" comment="python-xpcom190 less than 1.9.0.6-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0365</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0365" source="CVE"/>
	<description>
	nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1c57b0260c89d74e0042162cb9f22fbc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051955" comment="NetworkManager-devel less than 0.7.0.r4359-15.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051956" comment="NetworkManager-doc less than 0.7.0.r4359-15.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051957" comment="NetworkManager-glib less than 0.7.0.r4359-15.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051958" comment="NetworkManager less than 0.7.0.r4359-15.2.2"/>
		</criteria>
	</criteria>
	<!-- 53f9a3590be806fad802661b9d72d773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051966" comment="NetworkManager-gnome less than 0.7.0.r1053-11.1.1"/>
	</criteria>
	<!-- 899de54362214cb9b1496d406d58542c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051971" comment="ModemManager less than 0.1_20081203-6.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051972" comment="NetworkManager-devel less than 0.7.0.r4359-15.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051973" comment="NetworkManager-doc less than 0.7.0.r4359-15.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051974" comment="NetworkManager-glib less than 0.7.0.r4359-15.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051975" comment="NetworkManager less than 0.7.0.r4359-15.1.1"/>
		</criteria>
	</criteria>
	<!-- ac1fdff60a91fb052e3b3ae8d3df183d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051980" comment="NetworkManager-kde-devel less than 0.7r848570-23.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051981" comment="NetworkManager-kde less than 0.7r848570-23.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051982" comment="NetworkManager-openvpn-kde less than 0.7r848570-23.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051983" comment="NetworkManager-vpnc-kde less than 0.7r848570-23.2.1"/>
		</criteria>
	</criteria>
	<!-- e3328bd95f4a661926b5629b28ccc70c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051984" comment="cnetworkmanager less than 0.8.0.1-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0368</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0368" source="CVE"/>
	<description>
	OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.
	</description>
 </metadata>
<!-- dc96df9d0b9e018d13e8b307cbd82481 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051992" comment="libopensc2-32bit less than 0.11.6-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051993" comment="libopensc2-64bit less than 0.11.6-5.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051994" comment="libopensc2 less than 0.11.6-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051995" comment="opensc-32bit less than 0.11.6-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051996" comment="opensc-64bit less than 0.11.6-5.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051997" comment="opensc-devel less than 0.11.6-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051998" comment="opensc less than 0.11.6-5.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0386</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0386" source="CVE"/>
	<description>
	Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 might allow remote attackers to execute arbitrary code via crafted Composition Time To Sample (ctts) atom data in a malformed QuickTime media .mov file.
	</description>
 </metadata>
<!-- 1bfc9a62cfbfc6b3e0fd173c8b222e1b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052009" comment="gstreamer-0_10-plugins-good-doc less than 0.10.10-3.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052010" comment="gstreamer-0_10-plugins-good-extra less than 0.10.10-3.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052011" comment="gstreamer-0_10-plugins-good-lang less than 0.10.10-3.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052012" comment="gstreamer-0_10-plugins-good less than 0.10.10-3.21.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0387</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0387" source="CVE"/>
	<description>
	Array index error in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted Sync Sample (aka stss) atom data in a malformed QuickTime media .mov file, related to "mark keyframes."
	</description>
 </metadata>
<!-- 1bfc9a62cfbfc6b3e0fd173c8b222e1b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052009" comment="gstreamer-0_10-plugins-good-doc less than 0.10.10-3.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052010" comment="gstreamer-0_10-plugins-good-extra less than 0.10.10-3.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052011" comment="gstreamer-0_10-plugins-good-lang less than 0.10.10-3.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052012" comment="gstreamer-0_10-plugins-good less than 0.10.10-3.21.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0397</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0397" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0397" source="CVE"/>
	<description>
	Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11, and GStreamer Plug-ins (aka gstreamer-plugins) 0.8.5, might allow remote attackers to execute arbitrary code via crafted Time-to-sample (aka stts) atom data in a malformed QuickTime media .mov file.
	</description>
 </metadata>
<!-- 1bfc9a62cfbfc6b3e0fd173c8b222e1b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052009" comment="gstreamer-0_10-plugins-good-doc less than 0.10.10-3.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052010" comment="gstreamer-0_10-plugins-good-extra less than 0.10.10-3.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052011" comment="gstreamer-0_10-plugins-good-lang less than 0.10.10-3.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052012" comment="gstreamer-0_10-plugins-good less than 0.10.10-3.21.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0416</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0416" source="CVE"/>
	<description>
	The SSL certificate setup program (genSslCert.sh) in Standards Based Linux Instrumentation for Manageability (SBLIM) sblim-sfcb 1.3.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /var/tmp/key.pem, (2) /var/tmp/cert.pem, and (3) /var/tmp/ssl.cnf temporary files.
	</description>
 </metadata>
<!-- e8cbda4f863a874c425082a3856244ba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052014" comment="sblim-sfcb less than 1.3.2-9.12.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0478</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0478" source="CVE"/>
	<description>
	Squid 2.7 to 2.7.STABLE5, 3.0 to 3.0.STABLE12, and 3.1 to 3.1.0.4 allows remote attackers to cause a denial of service via an HTTP request with an invalid version number, which triggers a reachable assertion in (1) HttpMsg.c and (2) HttpStatusLine.c.
	</description>
 </metadata>
<!-- ff1e6e6ad95c151561687fabfd44e8a6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052015" comment="squid less than 2.7.STABLE5-1.20.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0490</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0490" source="CVE"/>
	<description>
	Stack-based buffer overflow in the String_parse::get_nonspace_quoted function in lib-src/allegro/strparse.cpp in Audacity 1.2.6 and other versions before 1.3.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a .gro file containing a long string.
	</description>
 </metadata>
<!-- 8a3451a8f32b07b65df2d88b6630d90a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052017" comment="audacity less than 1.3.5-49.12.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0499</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0499" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in the forum code in Moodle 1.7 before 1.7.7, 1.8 before 1.8.8, and 1.9 before 1.9.4 allows remote attackers to delete unauthorized forum posts via a link or IMG tag to post.php.
	</description>
 </metadata>
<!-- b9ec1816ecb787b4492642cd5084c7a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052073" comment="moodle-af less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052074" comment="moodle-ar less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052075" comment="moodle-be less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052076" comment="moodle-bg less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052077" comment="moodle-bs less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052078" comment="moodle-ca less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052079" comment="moodle-cs less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052080" comment="moodle-da less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052081" comment="moodle-de less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052082" comment="moodle-de_du less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052083" comment="moodle-el less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052084" comment="moodle-es less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052085" comment="moodle-et less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052086" comment="moodle-eu less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052087" comment="moodle-fa less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052088" comment="moodle-fi less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052089" comment="moodle-fr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052090" comment="moodle-ga less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052091" comment="moodle-gl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052092" comment="moodle-he less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052093" comment="moodle-hi less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052094" comment="moodle-hr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052095" comment="moodle-hu less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052096" comment="moodle-id less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052097" comment="moodle-is less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052098" comment="moodle-it less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052099" comment="moodle-ja less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052100" comment="moodle-ka less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052101" comment="moodle-km less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052102" comment="moodle-kn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052103" comment="moodle-ko less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052104" comment="moodle-lt less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052105" comment="moodle-lv less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052106" comment="moodle-mi_tn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052107" comment="moodle-ms less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052108" comment="moodle-nl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052109" comment="moodle-nn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052110" comment="moodle-no less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052111" comment="moodle-pl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052112" comment="moodle-pt less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052113" comment="moodle-ro less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052114" comment="moodle-ru less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052115" comment="moodle-sk less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052116" comment="moodle-sl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052117" comment="moodle-so less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052118" comment="moodle-sq less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052119" comment="moodle-sr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052120" comment="moodle-sv less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052121" comment="moodle-th less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052122" comment="moodle-tl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052123" comment="moodle-tr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052124" comment="moodle-uk less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052125" comment="moodle-vi less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052126" comment="moodle-zh_cn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052127" comment="moodle less than 1.9.3-1.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0500</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0500" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in course/lib.php in Moodle 1.6 before 1.6.9, 1.7 before 1.7.7, 1.8 before 1.8.8, and 1.9 before 1.9.4 allows remote attackers to inject arbitrary web script or HTML via crafted log table information that is not properly handled when it is displayed in a log report.
	</description>
 </metadata>
<!-- b9ec1816ecb787b4492642cd5084c7a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052073" comment="moodle-af less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052074" comment="moodle-ar less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052075" comment="moodle-be less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052076" comment="moodle-bg less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052077" comment="moodle-bs less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052078" comment="moodle-ca less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052079" comment="moodle-cs less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052080" comment="moodle-da less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052081" comment="moodle-de less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052082" comment="moodle-de_du less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052083" comment="moodle-el less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052084" comment="moodle-es less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052085" comment="moodle-et less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052086" comment="moodle-eu less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052087" comment="moodle-fa less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052088" comment="moodle-fi less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052089" comment="moodle-fr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052090" comment="moodle-ga less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052091" comment="moodle-gl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052092" comment="moodle-he less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052093" comment="moodle-hi less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052094" comment="moodle-hr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052095" comment="moodle-hu less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052096" comment="moodle-id less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052097" comment="moodle-is less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052098" comment="moodle-it less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052099" comment="moodle-ja less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052100" comment="moodle-ka less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052101" comment="moodle-km less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052102" comment="moodle-kn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052103" comment="moodle-ko less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052104" comment="moodle-lt less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052105" comment="moodle-lv less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052106" comment="moodle-mi_tn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052107" comment="moodle-ms less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052108" comment="moodle-nl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052109" comment="moodle-nn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052110" comment="moodle-no less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052111" comment="moodle-pl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052112" comment="moodle-pt less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052113" comment="moodle-ro less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052114" comment="moodle-ru less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052115" comment="moodle-sk less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052116" comment="moodle-sl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052117" comment="moodle-so less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052118" comment="moodle-sq less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052119" comment="moodle-sr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052120" comment="moodle-sv less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052121" comment="moodle-th less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052122" comment="moodle-tl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052123" comment="moodle-tr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052124" comment="moodle-uk less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052125" comment="moodle-vi less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052126" comment="moodle-zh_cn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052127" comment="moodle less than 1.9.3-1.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0501</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0501" source="CVE"/>
	<description>
	Unspecified vulnerability in the Calendar export feature in Moodle 1.8 before 1.8.8 and 1.9 before 1.9.4 allows attackers to obtain sensitive information and conduct "brute force attacks on user accounts" via unknown vectors.
	</description>
 </metadata>
<!-- b9ec1816ecb787b4492642cd5084c7a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052073" comment="moodle-af less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052074" comment="moodle-ar less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052075" comment="moodle-be less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052076" comment="moodle-bg less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052077" comment="moodle-bs less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052078" comment="moodle-ca less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052079" comment="moodle-cs less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052080" comment="moodle-da less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052081" comment="moodle-de less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052082" comment="moodle-de_du less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052083" comment="moodle-el less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052084" comment="moodle-es less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052085" comment="moodle-et less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052086" comment="moodle-eu less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052087" comment="moodle-fa less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052088" comment="moodle-fi less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052089" comment="moodle-fr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052090" comment="moodle-ga less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052091" comment="moodle-gl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052092" comment="moodle-he less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052093" comment="moodle-hi less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052094" comment="moodle-hr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052095" comment="moodle-hu less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052096" comment="moodle-id less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052097" comment="moodle-is less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052098" comment="moodle-it less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052099" comment="moodle-ja less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052100" comment="moodle-ka less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052101" comment="moodle-km less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052102" comment="moodle-kn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052103" comment="moodle-ko less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052104" comment="moodle-lt less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052105" comment="moodle-lv less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052106" comment="moodle-mi_tn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052107" comment="moodle-ms less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052108" comment="moodle-nl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052109" comment="moodle-nn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052110" comment="moodle-no less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052111" comment="moodle-pl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052112" comment="moodle-pt less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052113" comment="moodle-ro less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052114" comment="moodle-ru less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052115" comment="moodle-sk less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052116" comment="moodle-sl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052117" comment="moodle-so less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052118" comment="moodle-sq less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052119" comment="moodle-sr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052120" comment="moodle-sv less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052121" comment="moodle-th less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052122" comment="moodle-tl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052123" comment="moodle-tr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052124" comment="moodle-uk less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052125" comment="moodle-vi less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052126" comment="moodle-zh_cn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052127" comment="moodle less than 1.9.3-1.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0502</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0502" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in blocks/html/block_html.php in Snoopy 1.2.3, as used in Moodle 1.6 before 1.6.9, 1.7 before 1.7.7, 1.8 before 1.8.8, and 1.9 before 1.9.4, allows remote attackers to inject arbitrary web script or HTML via an HTML block, which is not properly handled when the "Login as" feature is used to visit a MyMoodle or Blog page.
	</description>
 </metadata>
<!-- b9ec1816ecb787b4492642cd5084c7a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052073" comment="moodle-af less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052074" comment="moodle-ar less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052075" comment="moodle-be less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052076" comment="moodle-bg less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052077" comment="moodle-bs less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052078" comment="moodle-ca less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052079" comment="moodle-cs less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052080" comment="moodle-da less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052081" comment="moodle-de less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052082" comment="moodle-de_du less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052083" comment="moodle-el less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052084" comment="moodle-es less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052085" comment="moodle-et less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052086" comment="moodle-eu less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052087" comment="moodle-fa less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052088" comment="moodle-fi less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052089" comment="moodle-fr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052090" comment="moodle-ga less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052091" comment="moodle-gl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052092" comment="moodle-he less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052093" comment="moodle-hi less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052094" comment="moodle-hr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052095" comment="moodle-hu less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052096" comment="moodle-id less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052097" comment="moodle-is less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052098" comment="moodle-it less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052099" comment="moodle-ja less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052100" comment="moodle-ka less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052101" comment="moodle-km less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052102" comment="moodle-kn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052103" comment="moodle-ko less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052104" comment="moodle-lt less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052105" comment="moodle-lv less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052106" comment="moodle-mi_tn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052107" comment="moodle-ms less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052108" comment="moodle-nl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052109" comment="moodle-nn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052110" comment="moodle-no less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052111" comment="moodle-pl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052112" comment="moodle-pt less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052113" comment="moodle-ro less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052114" comment="moodle-ru less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052115" comment="moodle-sk less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052116" comment="moodle-sl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052117" comment="moodle-so less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052118" comment="moodle-sq less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052119" comment="moodle-sr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052120" comment="moodle-sv less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052121" comment="moodle-th less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052122" comment="moodle-tl less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052123" comment="moodle-tr less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052124" comment="moodle-uk less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052125" comment="moodle-vi less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052126" comment="moodle-zh_cn less than 1.9.3-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052127" comment="moodle less than 1.9.3-1.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0509</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0509" source="CVE"/>
	<description>
	Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 allows remote attackers to execute arbitrary code via a crafted file that triggers memory corruption.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051914" comment="acroread less than 8.1.6-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0510</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0510" source="CVE"/>
	<description>
	Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-0511, CVE-2009-0512, CVE-2009-0888, and CVE-2009-0889.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051914" comment="acroread less than 8.1.6-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0511</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0511" source="CVE"/>
	<description>
	Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-0510, CVE-2009-0512, CVE-2009-0888, and CVE-2009-0889.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051914" comment="acroread less than 8.1.6-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0512</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0512" source="CVE"/>
	<description>
	Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-0510, CVE-2009-0511, CVE-2009-0888, and CVE-2009-0889.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051914" comment="acroread less than 8.1.6-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0519</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0519" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a crafted Shockwave Flash (aka .swf) file.
	</description>
 </metadata>
<!-- 31b49f5e5d89220061c13b7ea115b027 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051790" comment="flash-player less than 10.0.22.87-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0520</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0520" source="CVE"/>
	<description>
	Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 does not properly remove references to destroyed objects during Shockwave Flash file processing, which allows remote attackers to execute arbitrary code via a crafted file, related to a "buffer overflow issue."
	</description>
 </metadata>
<!-- 31b49f5e5d89220061c13b7ea115b027 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051790" comment="flash-player less than 10.0.22.87-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0521</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0521" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 on Linux allows local users to obtain sensitive information or gain privileges via a crafted library in a directory contained in the RPATH.
	</description>
 </metadata>
<!-- 31b49f5e5d89220061c13b7ea115b027 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051790" comment="flash-player less than 10.0.22.87-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0544</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0544" source="CVE"/>
	<description>
	Buffer overflow in the PyCrypto ARC2 module 2.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large ARC2 key length.
	</description>
 </metadata>
<!-- a1237733213a6cd24246d782ef3e5ca1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052130" comment="python-crypto less than 2.0.1-28.115.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0578</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0578" source="CVE"/>
	<description>
	GNOME NetworkManager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.NetworkManagerUserSettings and at_console.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1c57b0260c89d74e0042162cb9f22fbc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051955" comment="NetworkManager-devel less than 0.7.0.r4359-15.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051956" comment="NetworkManager-doc less than 0.7.0.r4359-15.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051957" comment="NetworkManager-glib less than 0.7.0.r4359-15.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051958" comment="NetworkManager less than 0.7.0.r4359-15.2.2"/>
		</criteria>
	</criteria>
	<!-- 53f9a3590be806fad802661b9d72d773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051966" comment="NetworkManager-gnome less than 0.7.0.r1053-11.1.1"/>
	</criteria>
	<!-- 899de54362214cb9b1496d406d58542c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051971" comment="ModemManager less than 0.1_20081203-6.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051972" comment="NetworkManager-devel less than 0.7.0.r4359-15.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051973" comment="NetworkManager-doc less than 0.7.0.r4359-15.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051974" comment="NetworkManager-glib less than 0.7.0.r4359-15.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051975" comment="NetworkManager less than 0.7.0.r4359-15.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0580</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0580" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
	</description>
 </metadata>
<!-- 654c73dbf6fd8c8fee7aa6bef342dba6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051437" comment="tomcat6-admin-webapps less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051438" comment="tomcat6-docs-webapp less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051439" comment="tomcat6-javadoc less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051440" comment="tomcat6-jsp-2_1-api less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051441" comment="tomcat6-lib less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051442" comment="tomcat6-servlet-2_5-api less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051443" comment="tomcat6-webapps less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051444" comment="tomcat6 less than 6.0.18-16.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0581</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0581" source="CVE"/>
	<description>
	Memory leak in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted image file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16c6fc18813ebd69bfe39cd8c4a3e301 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052138" comment="lcms less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052139" comment="liblcms-devel-32bit less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052140" comment="liblcms-devel-64bit less than 1.17-44.59.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052141" comment="liblcms-devel less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052142" comment="liblcms1-32bit less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052143" comment="liblcms1-64bit less than 1.17-44.59.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052144" comment="liblcms1 less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052145" comment="python-lcms less than 1.17-44.59.1"/>
		</criteria>
	</criteria>
	<!-- e3d119329c49979d387380d9b1d35bc6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052159" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052160" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052161" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052162" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052163" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052164" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052165" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052166" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052167" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052168" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052169" comment="java-1_6_0-openjdk less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052170" comment="java-1_6_0-openjdk less than 1.4_b14-24.3.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0582</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0582" source="CVE"/>
	<description>
	The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.
	</description>
 </metadata>
<!-- 599526f48039eb2f999bbd06f3189c5e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052174" comment="evolution-data-server-32bit less than 2.24.1.1-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052175" comment="evolution-data-server-devel less than 2.24.1.1-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052176" comment="evolution-data-server-doc less than 2.24.1.1-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052177" comment="evolution-data-server-lang less than 2.24.1.1-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052178" comment="evolution-data-server less than 2.24.1.1-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052179" comment="evolution-devel less than 2.24.1.1-4.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052180" comment="evolution-lang less than 2.24.1.1-4.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052181" comment="evolution-mono-providers less than 0.1.1-2.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052182" comment="evolution-pilot less than 2.24.1.1-4.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052183" comment="evolution less than 2.24.1.1-4.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052184" comment="gtkhtml2-devel less than 3.24.1.1-1.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052185" comment="gtkhtml2-lang less than 3.24.1.1-1.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052186" comment="gtkhtml2 less than 3.24.1.1-1.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0583</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583" source="CVE"/>
	<description>
	Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
	</description>
 </metadata>
<!-- ca5ee32c7a833af59d9df328e6cee100 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052213" comment="ghostscript-devel less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052214" comment="ghostscript-fonts-other less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052215" comment="ghostscript-fonts-rus less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052216" comment="ghostscript-fonts-std less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052217" comment="ghostscript-ijs-devel less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052218" comment="ghostscript-library less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052219" comment="ghostscript-omni less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052220" comment="ghostscript-x11 less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052221" comment="libgimpprint-devel less than 4.2.7-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052222" comment="libgimpprint less than 4.2.7-31.40.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0584</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584" source="CVE"/>
	<description>
	icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
	</description>
 </metadata>
<!-- ca5ee32c7a833af59d9df328e6cee100 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052213" comment="ghostscript-devel less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052214" comment="ghostscript-fonts-other less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052215" comment="ghostscript-fonts-rus less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052216" comment="ghostscript-fonts-std less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052217" comment="ghostscript-ijs-devel less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052218" comment="ghostscript-library less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052219" comment="ghostscript-omni less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052220" comment="ghostscript-x11 less than 8.62-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052221" comment="libgimpprint-devel less than 4.2.7-31.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052222" comment="libgimpprint less than 4.2.7-31.40.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0586</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0586" source="CVE"/>
	<description>
	Integer overflow in the gst_vorbis_tag_add_coverart function (gst-libs/gst/tag/gstvorbistag.c) in vorbistag in gst-plugins-base (aka gstreamer-plugins-base) before 0.10.23 in GStreamer allows context-dependent attackers to execute arbitrary code via a crafted COVERART tag that is converted from a base64 representation, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 6289bac3b4d3253278b899c2724c1634 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052241" comment="gstreamer-0_10-plugins-base-32bit less than 0.10.21-2.21.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052242" comment="gstreamer-0_10-plugins-base-devel less than 0.10.21-2.21.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052243" comment="gstreamer-0_10-plugins-base-doc less than 0.10.21-2.21.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052244" comment="gstreamer-0_10-plugins-base-lang less than 0.10.21-2.21.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052245" comment="gstreamer-0_10-plugins-base less than 0.10.21-2.21.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052246" comment="libgstinterfaces-0_10-0-32bit less than 0.10.21-2.21.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052247" comment="libgstinterfaces-0_10-0 less than 0.10.21-2.21.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0590</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590" source="CVE"/>
	<description>
	The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 248f4f500ff1abd84df2b2e973885818 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052249" comment="libopenssl-devel less than 0.9.8h-28.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052250" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052251" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052252" comment="libopenssl0_9_8 less than 0.9.8h-28.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052253" comment="openssl-doc less than 0.9.8h-28.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052254" comment="openssl less than 0.9.8h-28.8.1"/>
		</criteria>
	</criteria>
	<!-- f29bc510f4ec67fd2f24fbc774fc3f2f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052280" comment="compat-openssl097g-32bit less than 0.9.7g-146.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052281" comment="compat-openssl097g-64bit less than 0.9.7g-146.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052282" comment="compat-openssl097g less than 0.9.7g-146.10.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0591</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0591" source="CVE"/>
	<description>
	The CMS_verify function in OpenSSL 0.9.8h through 0.9.8j, when CMS is enabled, does not properly handle errors associated with malformed signed attributes, which allows remote attackers to repudiate a signature that originally appeared to be valid but was actually invalid.
	</description>
 </metadata>
<!-- 248f4f500ff1abd84df2b2e973885818 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052249" comment="libopenssl-devel less than 0.9.8h-28.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052250" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052251" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052252" comment="libopenssl0_9_8 less than 0.9.8h-28.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052253" comment="openssl-doc less than 0.9.8h-28.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052254" comment="openssl less than 0.9.8h-28.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0599</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0599" source="CVE"/>
	<description>
	Buffer overflow in wiretap/netscreen.c in Wireshark 0.99.7 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed NetScreen snoop file.
	</description>
 </metadata>
<!-- 1ab0b94032a4fc59c1c2c4e35fc01d57 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052285" comment="wireshark-devel less than 1.0.4-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052286" comment="wireshark less than 1.0.4-2.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0600</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0600" source="CVE"/>
	<description>
	Wireshark 0.99.6 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted Tektronix K12 text capture file, as demonstrated by a file with exactly one frame.
	</description>
 </metadata>
<!-- 1ab0b94032a4fc59c1c2c4e35fc01d57 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052285" comment="wireshark-devel less than 1.0.4-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052286" comment="wireshark less than 1.0.4-2.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0601</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0601" source="CVE"/>
	<description>
	Format string vulnerability in Wireshark 0.99.8 through 1.0.5 on non-Windows platforms allows local users to cause a denial of service (application crash) via format string specifiers in the HOME environment variable.
	</description>
 </metadata>
<!-- 1ab0b94032a4fc59c1c2c4e35fc01d57 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052285" comment="wireshark-devel less than 1.0.4-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052286" comment="wireshark less than 1.0.4-2.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0642</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0642" source="CVE"/>
	<description>
	ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053202" comment="ruby-devel less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053203" comment="ruby-doc-html less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053204" comment="ruby-doc-ri less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053205" comment="ruby-examples less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053206" comment="ruby-test-suite less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053207" comment="ruby-tk less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053208" comment="ruby less than 1.8.7.p72-5.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0652</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652" source="CVE"/>
	<description>
	The Internationalized Domain Names (IDN) blacklist in Mozilla Firefox 3.0.6 and other versions before 3.0.9; Thunderbird before 2.0.0.21; and SeaMonkey before 1.1.15 does not include box-drawing characters, which allows remote attackers to spoof URLs and conduct phishing attacks, as demonstrated by homoglyphs of the / (slash) and ? (question mark) characters in a subdomain of a .cn domain name, a different vulnerability than CVE-2005-0233.  NOTE: some third parties claim that 3.0.6 is not affected, but much older versions perhaps are affected.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08a92c44781debfd0a127ac9dedd8ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032269" comment="mozilla-xulrunner190-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052297" comment="mozilla-xulrunner190-devel less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052298" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032270" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052299" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032271" comment="mozilla-xulrunner190-translations less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032273" comment="mozilla-xulrunner190 less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052300" comment="python-xpcom190 less than 1.9.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051780" comment="seamonkey-dom-inspector less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051781" comment="seamonkey-irc less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051782" comment="seamonkey-mail less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051783" comment="seamonkey-spellchecker less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051784" comment="seamonkey-venkman less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051785" comment="seamonkey less than 1.1.16-1.1.2"/>
		</criteria>
	</criteria>
	<!-- f63cb107640bdca2da33aa6f5eb30267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052303" comment="MozillaFirefox-branding-upstream less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032267" comment="MozillaFirefox-translations less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032268" comment="MozillaFirefox less than 3.0.9-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0658</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0658" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E.
	</description>
 </metadata>
<!-- 03e82aa4432227738e571f5f8f20efc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051905" comment="acroread less than 8.1.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0676</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0676" source="CVE"/>
	<description>
	The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.
	</description>
 </metadata>
<!-- 2847c2d98282a27ceb2250538e56237b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052307" comment="kernel-debug-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052308" comment="kernel-debug-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052309" comment="kernel-debug less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032276" comment="kernel-default-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052310" comment="kernel-default-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032277" comment="kernel-default less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052311" comment="kernel-docs less than 2.6.3-3.13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032278" comment="kernel-kdump less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032289" comment="kernel-pae-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052312" comment="kernel-pae-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032290" comment="kernel-pae less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032279" comment="kernel-ppc64-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052313" comment="kernel-ppc64-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032280" comment="kernel-ppc64 less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052314" comment="kernel-ps3 less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032281" comment="kernel-source less than 2.6.27.21-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052315" comment="kernel-syms less than 2.6.27.21-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052316" comment="kernel-trace-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052317" comment="kernel-trace-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052318" comment="kernel-trace less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052319" comment="kernel-vanilla less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032285" comment="kernel-xen-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052320" comment="kernel-xen-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032286" comment="kernel-xen less than 2.6.27.21-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0688</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688" source="CVE"/>
	<description>
	Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
	</description>
 </metadata>
<!-- c8f7feab7548e931f28523d44f81e05c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052355" comment="cyrus-sasl-32bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052356" comment="cyrus-sasl-64bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052357" comment="cyrus-sasl-crammd5-32bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052358" comment="cyrus-sasl-crammd5-64bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052359" comment="cyrus-sasl-crammd5 less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052360" comment="cyrus-sasl-devel-32bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052361" comment="cyrus-sasl-devel-64bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052362" comment="cyrus-sasl-devel less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052363" comment="cyrus-sasl-digestmd5-32bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052364" comment="cyrus-sasl-digestmd5-64bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052365" comment="cyrus-sasl-digestmd5 less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052366" comment="cyrus-sasl-gssapi-32bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052367" comment="cyrus-sasl-gssapi-64bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052368" comment="cyrus-sasl-gssapi less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052369" comment="cyrus-sasl-ntlm less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052370" comment="cyrus-sasl-otp-32bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052371" comment="cyrus-sasl-otp-64bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052372" comment="cyrus-sasl-otp less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052373" comment="cyrus-sasl-plain-32bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052374" comment="cyrus-sasl-plain-64bit less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052375" comment="cyrus-sasl-plain less than 2.1.22-182.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052376" comment="cyrus-sasl less than 2.1.22-182.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0689</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689" source="CVE"/>
	<description>
	Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
		</criteria>
	</criteria>
	<!-- 3911462b3f68f3f2a965113f5b360cd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059214" comment="MozillaThunderbird-devel less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059215" comment="MozillaThunderbird-translations less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059216" comment="MozillaThunderbird less than 2.0.0.24-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 6afff2c3564e26489badb909c6d8e412 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056374" comment="opera less than 10.10-0.1.1"/>
	</criteria>
	<!-- 905ae89bbd71f145a4b2ab6acdd1d659 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060701" comment="seamonkey-dom-inspector less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060702" comment="seamonkey-irc less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060703" comment="seamonkey-mail less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060704" comment="seamonkey-spellchecker less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060705" comment="seamonkey-venkman less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060706" comment="seamonkey less than 1.1.19-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 9b1f74ec1352113e1871ef7f687b74cc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056648" comment="kdelibs3-32bit less than 3.5.10-21.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056649" comment="kdelibs3-64bit less than 3.5.10-21.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056650" comment="kdelibs3-arts-32bit less than 3.5.10-21.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056651" comment="kdelibs3-arts-64bit less than 3.5.10-21.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056652" comment="kdelibs3-arts less than 3.5.10-21.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056653" comment="kdelibs3-default-style-32bit less than 3.5.10-21.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056654" comment="kdelibs3-default-style-64bit less than 3.5.10-21.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056655" comment="kdelibs3-default-style less than 3.5.10-21.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056656" comment="kdelibs3-devel less than 3.5.10-21.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056657" comment="kdelibs3-doc less than 3.5.10-21.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056658" comment="kdelibs3 less than 3.5.10-21.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056659" comment="kdelibs4-core less than 4.1.3-4.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056660" comment="kdelibs4-doc less than 4.1.3-4.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056661" comment="kdelibs4 less than 4.1.3-4.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056662" comment="libkde4-32bit less than 4.1.3-4.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056663" comment="libkde4-devel less than 4.1.3-4.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056664" comment="libkde4 less than 4.1.3-4.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056665" comment="libkdecore4-32bit less than 4.1.3-4.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056666" comment="libkdecore4-devel less than 4.1.3-4.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056667" comment="libkdecore4 less than 4.1.3-4.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056668" comment="utempter-32bit less than 0.5.5-105.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056669" comment="utempter-64bit less than 0.5.5-105.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056670" comment="utempter less than 0.5.5-105.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056671" comment="utempter less than 0.5.5-105.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056672" comment="utempter less than 0.5.5-105.50"/>
		</criteria>
	</criteria>
	<!-- 9ca8a268825abc5af253fffbb2888dd8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056065" comment="mozilla-nspr-32bit less than 4.8.2-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056079" comment="mozilla-nspr-64bit less than 4.8.2-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056080" comment="mozilla-nspr-devel less than 4.8.2-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056067" comment="mozilla-nspr less than 4.8.2-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0692</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692" source="CVE"/>
	<description>
	Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.
	</description>
 </metadata>
<!-- ad22e43341380c18433746bd25b02346 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053431" comment="dhcp-client less than 3.1.1-6.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053432" comment="dhcp-devel less than 3.1.1-6.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053433" comment="dhcp-relay less than 3.1.1-6.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053434" comment="dhcp-server less than 3.1.1-6.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053435" comment="dhcp less than 3.1.1-6.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0696</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696" source="CVE"/>
	<description>
	The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.
	</description>
 </metadata>
<!-- 2e4a0b05deafffc560721af15910308a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053654" comment="bind-chrootenv less than 9.5.0P2-18.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053655" comment="bind-devel less than 9.5.0P2-18.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053656" comment="bind-doc less than 9.5.0P2-18.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053657" comment="bind-libs-32bit less than 9.5.0P2-18.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053658" comment="bind-libs-64bit less than 9.5.0P2-18.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053659" comment="bind-libs less than 9.5.0P2-18.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053660" comment="bind-utils less than 9.5.0P2-18.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053661" comment="bind less than 9.5.0P2-18.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0698</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0698" source="CVE"/>
	<description>
	Integer overflow in the 4xm demuxer (demuxers/demux_4xm.c) in xine-lib 1.1.16.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a 4X movie file with a large current_track value, a similar issue to CVE-2009-0385.
	</description>
 </metadata>
<!-- 4a0eddf0b27bf627bb916187feb6dc77 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052402" comment="libxine-devel less than 1.1.15-23.3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052403" comment="libxine1-32bit less than 1.1.15-23.3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052404" comment="libxine1-gnome-vfs less than 1.1.15-23.3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052405" comment="libxine1-pulse less than 1.1.15-23.3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052406" comment="libxine1 less than 1.1.15-23.3.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0723</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0723" source="CVE"/>
	<description>
	Multiple integer overflows in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16c6fc18813ebd69bfe39cd8c4a3e301 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052138" comment="lcms less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052139" comment="liblcms-devel-32bit less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052140" comment="liblcms-devel-64bit less than 1.17-44.59.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052141" comment="liblcms-devel less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052142" comment="liblcms1-32bit less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052143" comment="liblcms1-64bit less than 1.17-44.59.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052144" comment="liblcms1 less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052145" comment="python-lcms less than 1.17-44.59.1"/>
		</criteria>
	</criteria>
	<!-- e3d119329c49979d387380d9b1d35bc6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052159" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052160" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052161" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052162" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052163" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052164" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052165" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052166" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052167" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052168" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052169" comment="java-1_6_0-openjdk less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052170" comment="java-1_6_0-openjdk less than 1.4_b14-24.3.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0733</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0733" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the ReadSetOfCurves function in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file associated with a large integer value for the (1) input or (2) output channel, related to the ReadLUT_A2B and ReadLUT_B2A functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16c6fc18813ebd69bfe39cd8c4a3e301 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052138" comment="lcms less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052139" comment="liblcms-devel-32bit less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052140" comment="liblcms-devel-64bit less than 1.17-44.59.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052141" comment="liblcms-devel less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052142" comment="liblcms1-32bit less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052143" comment="liblcms1-64bit less than 1.17-44.59.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052144" comment="liblcms1 less than 1.17-44.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052145" comment="python-lcms less than 1.17-44.59.1"/>
		</criteria>
	</criteria>
	<!-- e3d119329c49979d387380d9b1d35bc6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052159" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052160" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052161" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052162" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052163" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052164" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052165" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052166" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052167" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052168" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.3.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052169" comment="java-1_6_0-openjdk less than 1.4_b14-24.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052170" comment="java-1_6_0-openjdk less than 1.4_b14-24.3.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0749</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0749" source="CVE"/>
	<description>
	Use-after-free vulnerability in the GIFReadNextExtension function in lib/pngxtern/gif/gifread.c in OptiPNG 0.6.2 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted GIF image that causes the realloc function to return a new pointer, which triggers memory corruption when the old pointer is accessed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 635d66639c1196b74c1f3732a73929e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052413" comment="optipng less than 0.6.1-10.4.1"/>
	</criteria>
	<!-- a5c0a2df14cab64172e080cf34313719 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051143" comment="optipng less than 0.6.1-10.3.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0754</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0754" source="CVE"/>
	<description>
	PHP 4.4.4, 5.1.6, and other versions, when running on Apache, allows local users to modify behavior of other sites hosted on the same web server by modifying the mbstring.func_overload setting within .htaccess, which causes this setting to be applied to other virtual hosts on the same server.
	</description>
 </metadata>
<!-- 3291c2ef45434af34802ca073998445d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051269" comment="apache2-mod_php5 less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051270" comment="php5-bcmath less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051271" comment="php5-bz2 less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051272" comment="php5-calendar less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051273" comment="php5-ctype less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051274" comment="php5-curl less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051275" comment="php5-dba less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051276" comment="php5-dbase less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051277" comment="php5-devel less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051278" comment="php5-dom less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051279" comment="php5-exif less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051280" comment="php5-fastcgi less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051281" comment="php5-ftp less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051282" comment="php5-gd less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051283" comment="php5-gettext less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051284" comment="php5-gmp less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051285" comment="php5-hash less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051286" comment="php5-iconv less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051287" comment="php5-imap less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051288" comment="php5-json less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051289" comment="php5-ldap less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051290" comment="php5-mbstring less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051291" comment="php5-mcrypt less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051292" comment="php5-mysql less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051293" comment="php5-ncurses less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051294" comment="php5-odbc less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051295" comment="php5-openssl less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051296" comment="php5-pcntl less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051297" comment="php5-pdo less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051298" comment="php5-pear less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051299" comment="php5-pgsql less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051300" comment="php5-posix less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051301" comment="php5-pspell less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051302" comment="php5-readline less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051303" comment="php5-shmop less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051304" comment="php5-snmp less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051305" comment="php5-soap less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051306" comment="php5-sockets less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051307" comment="php5-sqlite less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051308" comment="php5-suhosin less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051309" comment="php5-sysvmsg less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051310" comment="php5-sysvsem less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051311" comment="php5-sysvshm less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051312" comment="php5-tidy less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051313" comment="php5-tokenizer less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051314" comment="php5-wddx less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051315" comment="php5-xmlreader less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051316" comment="php5-xmlrpc less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051317" comment="php5-xmlwriter less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051318" comment="php5-xsl less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051319" comment="php5-zip less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051320" comment="php5-zlib less than 5.2.9-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0755</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0755" source="CVE"/>
	<description>
	The FormWidgetChoice::loadDefaults function in Poppler before 0.10.4 allows remote attackers to cause a denial of service (crash) via a PDF file with an invalid Form Opt entry.
	</description>
 </metadata>
<!-- 1f8ab5ee5635df09064e67724be43217 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051818" comment="libpoppler4 less than 0.10.1-1.6.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0756</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0756" source="CVE"/>
	<description>
	The JBIG2Stream::readSymbolDictSeg function in Poppler before 0.10.4 allows remote attackers to cause a denial of service (crash) via a PDF file that triggers a parsing error, which is not properly handled by JBIG2SymbolDict::~JBIG2SymbolDict and triggers an invalid memory dereference.
	</description>
 </metadata>
<!-- 1f8ab5ee5635df09064e67724be43217 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051818" comment="libpoppler4 less than 0.10.1-1.6.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0758</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0758" source="CVE"/>
	<description>
	The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.
	</description>
 </metadata>
<!-- dad5d10952b85be36dde7d43721be905 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057589" comment="avahi-compat-howl-devel less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057590" comment="avahi-compat-mDNSResponder-devel less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057591" comment="avahi-lang less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057592" comment="avahi-utils less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057593" comment="avahi less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057594" comment="libavahi-client3-32bit less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057595" comment="libavahi-client3-64bit less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057596" comment="libavahi-client3 less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057597" comment="libavahi-common3-32bit less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057598" comment="libavahi-common3-64bit less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057599" comment="libavahi-common3 less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057600" comment="libavahi-core5 less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057601" comment="libavahi-devel less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057602" comment="libavahi-glib-devel less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057603" comment="libavahi-glib1-32bit less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057604" comment="libavahi-glib1-64bit less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057605" comment="libavahi-glib1 less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057606" comment="libavahi-gobject-devel less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057607" comment="libavahi-gobject0 less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057608" comment="libavahi-ui0 less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057609" comment="libdns_sd-32bit less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057610" comment="libdns_sd-64bit less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057611" comment="libdns_sd less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057612" comment="libhowl0 less than 0.6.23-9.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057613" comment="python-avahi less than 0.6.23-9.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0771</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0771" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption and assertion failures.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- af3b4d9fa7bc176fdabe13c7e21a5c64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051741" comment="MozillaFirefox-branding-upstream less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051742" comment="MozillaFirefox-translations less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051743" comment="MozillaFirefox less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051744" comment="mozilla-xulrunner190-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051745" comment="mozilla-xulrunner190-devel less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051746" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051747" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051748" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051749" comment="mozilla-xulrunner190-translations less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051750" comment="mozilla-xulrunner190 less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051751" comment="python-xpcom190 less than 1.9.0.7-1.2.2"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051780" comment="seamonkey-dom-inspector less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051781" comment="seamonkey-irc less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051782" comment="seamonkey-mail less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051783" comment="seamonkey-spellchecker less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051784" comment="seamonkey-venkman less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051785" comment="seamonkey less than 1.1.16-1.1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0772</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0772" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- af3b4d9fa7bc176fdabe13c7e21a5c64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051741" comment="MozillaFirefox-branding-upstream less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051742" comment="MozillaFirefox-translations less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051743" comment="MozillaFirefox less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051744" comment="mozilla-xulrunner190-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051745" comment="mozilla-xulrunner190-devel less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051746" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051747" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051748" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051749" comment="mozilla-xulrunner190-translations less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051750" comment="mozilla-xulrunner190 less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051751" comment="python-xpcom190 less than 1.9.0.7-1.2.2"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051780" comment="seamonkey-dom-inspector less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051781" comment="seamonkey-irc less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051782" comment="seamonkey-mail less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051783" comment="seamonkey-spellchecker less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051784" comment="seamonkey-venkman less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051785" comment="seamonkey less than 1.1.16-1.1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0773</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0773" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a splice of an array that contains "some non-set elements," which causes jsarray.cpp to pass an incorrect argument to the ResizeSlots function, which triggers memory corruption; (2) vectors related to js_DecompileValueGenerator, jsopcode.cpp, __defineSetter__, and watch, which triggers an assertion failure or a segmentation fault; and (3) vectors related to gczeal, __defineSetter__, and watch, which triggers a hang.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- af3b4d9fa7bc176fdabe13c7e21a5c64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051741" comment="MozillaFirefox-branding-upstream less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051742" comment="MozillaFirefox-translations less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051743" comment="MozillaFirefox less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051744" comment="mozilla-xulrunner190-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051745" comment="mozilla-xulrunner190-devel less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051746" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051747" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051748" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051749" comment="mozilla-xulrunner190-translations less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051750" comment="mozilla-xulrunner190 less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051751" comment="python-xpcom190 less than 1.9.0.7-1.2.2"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051780" comment="seamonkey-dom-inspector less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051781" comment="seamonkey-irc less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051782" comment="seamonkey-mail less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051783" comment="seamonkey-spellchecker less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051784" comment="seamonkey-venkman less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051785" comment="seamonkey less than 1.1.16-1.1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0774</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0774" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to gczeal, a different vulnerability than CVE-2009-0773.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- af3b4d9fa7bc176fdabe13c7e21a5c64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051741" comment="MozillaFirefox-branding-upstream less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051742" comment="MozillaFirefox-translations less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051743" comment="MozillaFirefox less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051744" comment="mozilla-xulrunner190-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051745" comment="mozilla-xulrunner190-devel less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051746" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051747" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051748" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051749" comment="mozilla-xulrunner190-translations less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051750" comment="mozilla-xulrunner190 less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051751" comment="python-xpcom190 less than 1.9.0.7-1.2.2"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051780" comment="seamonkey-dom-inspector less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051781" comment="seamonkey-irc less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051782" comment="seamonkey-mail less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051783" comment="seamonkey-spellchecker less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051784" comment="seamonkey-venkman less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051785" comment="seamonkey less than 1.1.16-1.1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0775</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0775" source="CVE"/>
	<description>
	Double free vulnerability in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to execute arbitrary code via "cloned XUL DOM elements which were linked as a parent and child," which are not properly handled during garbage collection.
	</description>
 </metadata>
<!-- af3b4d9fa7bc176fdabe13c7e21a5c64 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051741" comment="MozillaFirefox-branding-upstream less than 3.0.7-1.1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051742" comment="MozillaFirefox-translations less than 3.0.7-1.1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051743" comment="MozillaFirefox less than 3.0.7-1.1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051744" comment="mozilla-xulrunner190-32bit less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051745" comment="mozilla-xulrunner190-devel less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051746" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051747" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051748" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051749" comment="mozilla-xulrunner190-translations less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051750" comment="mozilla-xulrunner190 less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051751" comment="python-xpcom190 less than 1.9.0.7-1.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0776</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0776" source="CVE"/>
	<description>
	nsIRDFService in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to bypass the same-origin policy and read XML data from another domain via a cross-domain redirect.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- af3b4d9fa7bc176fdabe13c7e21a5c64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051741" comment="MozillaFirefox-branding-upstream less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051742" comment="MozillaFirefox-translations less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051743" comment="MozillaFirefox less than 3.0.7-1.1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051744" comment="mozilla-xulrunner190-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051745" comment="mozilla-xulrunner190-devel less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051746" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051747" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051748" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051749" comment="mozilla-xulrunner190-translations less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051750" comment="mozilla-xulrunner190 less than 1.9.0.7-1.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051751" comment="python-xpcom190 less than 1.9.0.7-1.2.2"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051780" comment="seamonkey-dom-inspector less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051781" comment="seamonkey-irc less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051782" comment="seamonkey-mail less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051783" comment="seamonkey-spellchecker less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051784" comment="seamonkey-venkman less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051785" comment="seamonkey less than 1.1.16-1.1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0777</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0777" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 decode invisible characters when they are displayed in the location bar, which causes an incorrect address to be displayed and makes it easier for remote attackers to spoof URLs and conduct phishing attacks.
	</description>
 </metadata>
<!-- af3b4d9fa7bc176fdabe13c7e21a5c64 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051741" comment="MozillaFirefox-branding-upstream less than 3.0.7-1.1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051742" comment="MozillaFirefox-translations less than 3.0.7-1.1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051743" comment="MozillaFirefox less than 3.0.7-1.1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051744" comment="mozilla-xulrunner190-32bit less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051745" comment="mozilla-xulrunner190-devel less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051746" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051747" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051748" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051749" comment="mozilla-xulrunner190-translations less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051750" comment="mozilla-xulrunner190 less than 1.9.0.7-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051751" comment="python-xpcom190 less than 1.9.0.7-1.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0781</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0781" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
	</description>
 </metadata>
<!-- 654c73dbf6fd8c8fee7aa6bef342dba6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051437" comment="tomcat6-admin-webapps less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051438" comment="tomcat6-docs-webapp less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051439" comment="tomcat6-javadoc less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051440" comment="tomcat6-jsp-2_1-api less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051441" comment="tomcat6-lib less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051442" comment="tomcat6-servlet-2_5-api less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051443" comment="tomcat6-webapps less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051444" comment="tomcat6 less than 6.0.18-16.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0783</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
	</description>
 </metadata>
<!-- 654c73dbf6fd8c8fee7aa6bef342dba6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051437" comment="tomcat6-admin-webapps less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051438" comment="tomcat6-docs-webapp less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051439" comment="tomcat6-javadoc less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051440" comment="tomcat6-jsp-2_1-api less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051441" comment="tomcat6-lib less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051442" comment="tomcat6-servlet-2_5-api less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051443" comment="tomcat6-webapps less than 6.0.18-16.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051444" comment="tomcat6 less than 6.0.18-16.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0789</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0789" source="CVE"/>
	<description>
	OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 248f4f500ff1abd84df2b2e973885818 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052249" comment="libopenssl-devel less than 0.9.8h-28.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052250" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052251" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052252" comment="libopenssl0_9_8 less than 0.9.8h-28.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052253" comment="openssl-doc less than 0.9.8h-28.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052254" comment="openssl less than 0.9.8h-28.8.1"/>
		</criteria>
	</criteria>
	<!-- f29bc510f4ec67fd2f24fbc774fc3f2f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052280" comment="compat-openssl097g-32bit less than 0.9.7g-146.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052281" comment="compat-openssl097g-64bit less than 0.9.7g-146.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052282" comment="compat-openssl097g less than 0.9.7g-146.10.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0790</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0790" source="CVE"/>
	<description>
	The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 85730a084b9f1c261a7f6b4f2ad9d421 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052416" comment="strongswan-doc less than 4.2.8-1.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052417" comment="strongswan less than 4.2.8-1.24.1"/>
		</criteria>
	</criteria>
	<!-- 8c70928a355b5eb7a1c7fc1b23a8a74e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052421" comment="openswan-doc less than 2.6.16-1.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052422" comment="openswan less than 2.6.16-1.47.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0791</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791" source="CVE"/>
	<description>
	Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7, GPdf, and kdegraphics KPDF, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4483982df88e47790f164139758639ff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057056" comment="libpoppler-devel less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057057" comment="libpoppler-doc less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057058" comment="libpoppler-glib-devel less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057059" comment="libpoppler-glib4 less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057060" comment="libpoppler-qt2 less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057061" comment="libpoppler-qt3-devel less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057062" comment="libpoppler-qt4-3 less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057063" comment="libpoppler-qt4-devel less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057064" comment="libpoppler4 less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057065" comment="poppler-tools less than 0.10.1-1.7.1"/>
		</criteria>
	</criteria>
	<!-- ef8f1bb6cdfacfb250de777405645e49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054172" comment="xpdf-tools less than 3.02-97.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054173" comment="xpdf less than 3.02-97.79.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0792</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792" source="CVE"/>
	<description>
	Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.  NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.
	</description>
 </metadata>
<!-- fdc70560402b44cb7ce9829765211428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047631" comment="ghostscript-devel less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047632" comment="ghostscript-fonts-other less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047633" comment="ghostscript-fonts-rus less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047634" comment="ghostscript-fonts-std less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047635" comment="ghostscript-ijs-devel less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047636" comment="ghostscript-library less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047637" comment="ghostscript-omni less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047638" comment="ghostscript-x11 less than 8.62-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047639" comment="libgimpprint-devel less than 4.2.7-31.43.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047640" comment="libgimpprint less than 4.2.7-31.43.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0793</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0793" source="CVE"/>
	<description>
	cmsxform.c in LittleCMS (aka lcms or liblcms) 1.18, as used in OpenJDK and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted image that triggers execution of incorrect code for "transformations of monochrome profiles."
	</description>
 </metadata>
<!-- ba41b676c39b719fa82afb950dfb8541 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054457" comment="java-1_6_0-openjdk-demo less than 1.5.1_b16-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054458" comment="java-1_6_0-openjdk-devel less than 1.5.1_b16-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054459" comment="java-1_6_0-openjdk-javadoc less than 1.5.1_b16-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054460" comment="java-1_6_0-openjdk-plugin less than 1.5.1_b16-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054461" comment="java-1_6_0-openjdk-src less than 1.5.1_b16-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054462" comment="java-1_6_0-openjdk less than 1.5.1_b16-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0794</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0794" source="CVE"/>
	<description>
	Integer overflow in the PulseAudioTargetDataL class in src/java/org/classpath/icedtea/pulseaudio/PulseAudioTargetDataLine.java in Pulse-Java, as used in OpenJDK 1.6.0.0 and other products, allows remote attackers to cause a denial of service (applet crash) via a crafted Pulse Audio source data line.
	</description>
 </metadata>
<!-- b798177b6cd5ed152a73adebbd729249 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052432" comment="java-1_6_0-openjdk-demo less than 1.4_b14-24.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052433" comment="java-1_6_0-openjdk-devel less than 1.4_b14-24.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052434" comment="java-1_6_0-openjdk-javadoc less than 1.4_b14-24.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052435" comment="java-1_6_0-openjdk-plugin less than 1.4_b14-24.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052436" comment="java-1_6_0-openjdk-src less than 1.4_b14-24.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052437" comment="java-1_6_0-openjdk less than 1.4_b14-24.4.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0799</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8ab5ee5635df09064e67724be43217 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051818" comment="libpoppler4 less than 0.10.1-1.6.10"/>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051830" comment="kdegraphics3-3D less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051831" comment="kdegraphics3-devel less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051832" comment="kdegraphics3-extra less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051833" comment="kdegraphics3-fax less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051834" comment="kdegraphics3-imaging less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051835" comment="kdegraphics3-kamera less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051836" comment="kdegraphics3-pdf less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051837" comment="kdegraphics3-postscript less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051838" comment="kdegraphics3-scan less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051839" comment="kdegraphics3-tex less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051840" comment="kdegraphics3 less than 3.5.10-1.63.2"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051854" comment="xpdf-tools less than 3.02-97.78.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051855" comment="xpdf less than 3.02-97.78.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0800</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800" source="CVE"/>
	<description>
	Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8ab5ee5635df09064e67724be43217 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051818" comment="libpoppler4 less than 0.10.1-1.6.10"/>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051830" comment="kdegraphics3-3D less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051831" comment="kdegraphics3-devel less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051832" comment="kdegraphics3-extra less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051833" comment="kdegraphics3-fax less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051834" comment="kdegraphics3-imaging less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051835" comment="kdegraphics3-kamera less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051836" comment="kdegraphics3-pdf less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051837" comment="kdegraphics3-postscript less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051838" comment="kdegraphics3-scan less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051839" comment="kdegraphics3-tex less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051840" comment="kdegraphics3 less than 3.5.10-1.63.2"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051854" comment="xpdf-tools less than 3.02-97.78.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051855" comment="xpdf less than 3.02-97.78.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0835</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0835" source="CVE"/>
	<description>
	The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.
	</description>
 </metadata>
<!-- 2847c2d98282a27ceb2250538e56237b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052307" comment="kernel-debug-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052308" comment="kernel-debug-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052309" comment="kernel-debug less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032276" comment="kernel-default-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052310" comment="kernel-default-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032277" comment="kernel-default less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052311" comment="kernel-docs less than 2.6.3-3.13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032278" comment="kernel-kdump less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032289" comment="kernel-pae-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052312" comment="kernel-pae-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032290" comment="kernel-pae less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032279" comment="kernel-ppc64-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052313" comment="kernel-ppc64-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032280" comment="kernel-ppc64 less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052314" comment="kernel-ps3 less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032281" comment="kernel-source less than 2.6.27.21-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052315" comment="kernel-syms less than 2.6.27.21-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052316" comment="kernel-trace-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052317" comment="kernel-trace-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052318" comment="kernel-trace less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052319" comment="kernel-vanilla less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032285" comment="kernel-xen-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052320" comment="kernel-xen-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032286" comment="kernel-xen less than 2.6.27.21-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0844</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844" source="CVE"/>
	<description>
	The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.
	</description>
 </metadata>
<!-- 0801012c98f8f6f5a600aff42a181053 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052463" comment="krb5-32bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052464" comment="krb5-64bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052465" comment="krb5-apps-clients less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052466" comment="krb5-apps-servers less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052467" comment="krb5-client less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052468" comment="krb5-devel-32bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052469" comment="krb5-devel-64bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052470" comment="krb5-devel less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052471" comment="krb5-server less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052472" comment="krb5 less than 1.6.3-132.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0845</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845" source="CVE"/>
	<description>
	The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via invalid ContextFlags data in the reqFlags field in a negTokenInit token.
	</description>
 </metadata>
<!-- 0801012c98f8f6f5a600aff42a181053 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052463" comment="krb5-32bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052464" comment="krb5-64bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052465" comment="krb5-apps-clients less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052466" comment="krb5-apps-servers less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052467" comment="krb5-client less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052468" comment="krb5-devel-32bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052469" comment="krb5-devel-64bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052470" comment="krb5-devel less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052471" comment="krb5-server less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052472" comment="krb5 less than 1.6.3-132.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0846</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846" source="CVE"/>
	<description>
	The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before 1.6.4 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors involving an invalid DER encoding that triggers a free of an uninitialized pointer.
	</description>
 </metadata>
<!-- 0801012c98f8f6f5a600aff42a181053 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052463" comment="krb5-32bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052464" comment="krb5-64bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052465" comment="krb5-apps-clients less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052466" comment="krb5-apps-servers less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052467" comment="krb5-client less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052468" comment="krb5-devel-32bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052469" comment="krb5-devel-64bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052470" comment="krb5-devel less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052471" comment="krb5-server less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052472" comment="krb5 less than 1.6.3-132.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0847</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847" source="CVE"/>
	<description>
	The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic.
	</description>
 </metadata>
<!-- 0801012c98f8f6f5a600aff42a181053 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052463" comment="krb5-32bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052464" comment="krb5-64bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052465" comment="krb5-apps-clients less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052466" comment="krb5-apps-servers less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052467" comment="krb5-client less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052468" comment="krb5-devel-32bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052469" comment="krb5-devel-64bit less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052470" comment="krb5-devel less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052471" comment="krb5-server less than 1.6.3-132.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052472" comment="krb5 less than 1.6.3-132.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0848</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0848" source="CVE"/>
	<description>
	Untrusted search path vulnerability in GTK2 in OpenSUSE 11.0 and 11.1 allows local users to execute arbitrary code via a Trojan horse GTK module in an unspecified "relative search path."
	</description>
 </metadata>
<!-- 454127860b00f239c71cdfb33869cde2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052492" comment="gtk2-32bit less than 2.14.4-8.6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052493" comment="gtk2-64bit less than 2.14.4-8.6.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052494" comment="gtk2-branding-upstream less than 2.14.4-8.6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052495" comment="gtk2-devel less than 2.14.4-8.6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052496" comment="gtk2-doc less than 2.14.4-8.6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052497" comment="gtk2-lang less than 2.14.4-8.6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052498" comment="gtk2 less than 2.14.4-8.6.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0901</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0901" source="CVE"/>
	<description>
	The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not prevent VariantClear calls on an uninitialized VARIANT, which allows remote attackers to execute arbitrary code via a malformed stream to an ATL (1) component or (2) control, related to ATL headers and error handling, aka "ATL Uninitialized Object Vulnerability."
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053711" comment="flash-player less than 10.0.32.18-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0914</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0914" source="CVE"/>
	<description>
	Opera before 9.64 allows remote attackers to execute arbitrary code via a crafted JPEG image that triggers memory corruption.
	</description>
 </metadata>
<!-- 2cfd6322b172b34f75ad0338475356b1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052499" comment="opera less than 9.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0915</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0915" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0915" source="CVE"/>
	<description>
	Opera before 9.64 allows remote attackers to conduct cross-domain scripting attacks via unspecified vectors related to plug-ins.
	</description>
 </metadata>
<!-- 2cfd6322b172b34f75ad0338475356b1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052499" comment="opera less than 9.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0916</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0916" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.64 has unknown impact and attack vectors, related to a "moderately severe issue."
	</description>
 </metadata>
<!-- 2cfd6322b172b34f75ad0338475356b1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052499" comment="opera less than 9.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0922</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0922" source="CVE"/>
	<description>
	PostgreSQL before 8.3.7, 8.2.13, 8.1.17, 8.0.21, and 7.4.25 allows remote authenticated users to cause a denial of service (stack consumption and crash) by triggering a failure in the conversion of a localized error message to a client-specified encoding, as demonstrated using mismatched encoding conversion requests.
	</description>
 </metadata>
<!-- bb91595b014b5bcfc445a9c2e8828b36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032320" comment="postgresql-contrib less than 8.3.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052517" comment="postgresql-devel less than 8.3.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032321" comment="postgresql-docs less than 8.3.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032322" comment="postgresql-libs-32bit less than 8.3.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052518" comment="postgresql-libs-64bit less than 8.3.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032324" comment="postgresql-libs less than 8.3.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032325" comment="postgresql-server less than 8.3.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032326" comment="postgresql less than 8.3.7-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0927</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0927" source="CVE"/>
	<description>
	Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object, a different vulnerability than CVE-2009-0658.
	</description>
 </metadata>
<!-- 03e82aa4432227738e571f5f8f20efc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051905" comment="acroread less than 8.1.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0928</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0928" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Acrobat Reader and Acrobat Professional 7.1.0, 8.1.3, 9.0.0, and other versions allows remote attackers to execute arbitrary code via a PDF file containing a JBIG2 stream with a size inconsistency related to an unspecified table.
	</description>
 </metadata>
<!-- 03e82aa4432227738e571f5f8f20efc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051905" comment="acroread less than 8.1.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0945</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0945" source="CVE"/>
	<description>
	Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 184a5ac237b657f1e7e088e8eb689f81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056178" comment="libqt4-32bit less than 4.4.3-4.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056179" comment="libqt4-64bit less than 4.4.3-4.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056180" comment="libqt4-devel less than 4.4.3-4.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056181" comment="libqt4-qt3support-32bit less than 4.4.3-4.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056182" comment="libqt4-qt3support-64bit less than 4.4.3-4.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056183" comment="libqt4-qt3support less than 4.4.3-4.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056184" comment="libqt4-sql-32bit less than 4.4.3-4.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056185" comment="libqt4-sql-64bit less than 4.4.3-4.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056186" comment="libqt4-sql-sqlite less than 4.4.3-4.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056187" comment="libqt4-sql less than 4.4.3-4.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056188" comment="libqt4-x11-32bit less than 4.4.3-4.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056189" comment="libqt4-x11-64bit less than 4.4.3-4.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056190" comment="libqt4-x11 less than 4.4.3-4.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056191" comment="libqt4 less than 4.4.3-4.10.1"/>
		</criteria>
	</criteria>
	<!-- 70dcc940129b8bbc947920fe8a861207 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064891" comment="kdegraphics3-3D less than 3.5.10-1.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064892" comment="kdegraphics3-devel less than 3.5.10-1.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064893" comment="kdegraphics3-extra less than 3.5.10-1.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064894" comment="kdegraphics3-fax less than 3.5.10-1.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064895" comment="kdegraphics3-imaging less than 3.5.10-1.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064896" comment="kdegraphics3-kamera less than 3.5.10-1.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064897" comment="kdegraphics3-pdf less than 3.5.10-1.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064898" comment="kdegraphics3-postscript less than 3.5.10-1.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064899" comment="kdegraphics3-scan less than 3.5.10-1.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064900" comment="kdegraphics3-tex less than 3.5.10-1.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064901" comment="kdegraphics3 less than 3.5.10-1.66.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0946</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-0946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946" source="CVE"/>
	<description>
	Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
	</description>
 </metadata>
<!-- 62fc892a3c02e4cea5408b01ce596eee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052527" comment="freetype2-32bit less than 2.3.7-24.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052528" comment="freetype2-64bit less than 2.3.7-24.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052529" comment="freetype2-devel-32bit less than 2.3.7-24.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052530" comment="freetype2-devel-64bit less than 2.3.7-24.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052531" comment="freetype2-devel less than 2.3.7-24.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052532" comment="freetype2 less than 2.3.7-24.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1044</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1044" source="CVE"/>
	<description>
	Mozilla Firefox 3.0.7 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors related to the _moveToEdgeShift XUL tree method, which triggers garbage collection on objects that are still in use, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009.
	</description>
 </metadata>
<!-- 3dddf5e823b876ce1c3b5bd9784f0837 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052557" comment="MozillaFirefox-branding-upstream less than 3.0.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032330" comment="MozillaFirefox-translations less than 3.0.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032331" comment="MozillaFirefox less than 3.0.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032332" comment="mozilla-xulrunner190-32bit less than 1.9.0.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052540" comment="mozilla-xulrunner190-devel less than 1.9.0.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052541" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032333" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052543" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032334" comment="mozilla-xulrunner190-translations less than 1.9.0.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032336" comment="mozilla-xulrunner190 less than 1.9.0.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052558" comment="python-xpcom190 less than 1.9.0.8-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1061</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1061" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Acrobat Reader 9 before 9.1, 8 before 8.1.4, and 7 before 7.1.1 might allow remote attackers to execute arbitrary code via unknown attack vectors related to JBIG2 and "input validation," a different vulnerability than CVE-2009-0193 and CVE-2009-1062.
	</description>
 </metadata>
<!-- 03e82aa4432227738e571f5f8f20efc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051905" comment="acroread less than 8.1.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1062</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1062" source="CVE"/>
	<description>
	Adobe Acrobat Reader 9 before 9.1, 8 before 8.1.4, and 7 before 7.1.1 might allow remote attackers to trigger memory corruption and possibly execute arbitrary code via unknown attack vectors related to JBIG2, a different vulnerability than CVE-2009-0193 and CVE-2009-1061.
	</description>
 </metadata>
<!-- 03e82aa4432227738e571f5f8f20efc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051905" comment="acroread less than 8.1.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1072</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1072" source="CVE"/>
	<description>
	nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.
	</description>
 </metadata>
<!-- 2847c2d98282a27ceb2250538e56237b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052307" comment="kernel-debug-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052308" comment="kernel-debug-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052309" comment="kernel-debug less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032276" comment="kernel-default-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052310" comment="kernel-default-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032277" comment="kernel-default less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052311" comment="kernel-docs less than 2.6.3-3.13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032278" comment="kernel-kdump less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032289" comment="kernel-pae-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052312" comment="kernel-pae-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032290" comment="kernel-pae less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032279" comment="kernel-ppc64-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052313" comment="kernel-ppc64-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032280" comment="kernel-ppc64 less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052314" comment="kernel-ps3 less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032281" comment="kernel-source less than 2.6.27.21-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052315" comment="kernel-syms less than 2.6.27.21-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052316" comment="kernel-trace-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052317" comment="kernel-trace-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052318" comment="kernel-trace less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052319" comment="kernel-vanilla less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032285" comment="kernel-xen-base less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052320" comment="kernel-xen-extra less than 2.6.27.21-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032286" comment="kernel-xen less than 2.6.27.21-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1086</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1086" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns 1.4.x allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a DNS resource record (RR) with a long (1) class field (clas variable) and possibly (2) TTL field.
	</description>
 </metadata>
<!-- 763515931639132d36b1c39b050982bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052559" comment="unbound-devel less than 1.0.0-2.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052560" comment="unbound less than 1.0.0-2.21.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1093</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1093" source="CVE"/>
	<description>
	LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052561" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052562" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052563" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052564" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052565" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052566" comment="java-1_5_0-sun less than 1.5.0_update18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1094</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1094" source="CVE"/>
	<description>
	Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052561" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052562" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052563" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052564" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052565" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052566" comment="java-1_5_0-sun less than 1.5.0_update18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1095</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1095" source="CVE"/>
	<description>
	Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052561" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052562" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052563" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052564" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052565" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052566" comment="java-1_5_0-sun less than 1.5.0_update18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1096</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1096" source="CVE"/>
	<description>
	Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052561" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052562" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052563" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052564" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052565" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052566" comment="java-1_5_0-sun less than 1.5.0_update18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1097</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1097" source="CVE"/>
	<description>
	Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.
	</description>
 </metadata>
<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1098</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1098" source="CVE"/>
	<description>
	Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052561" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052562" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052563" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052564" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052565" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052566" comment="java-1_5_0-sun less than 1.5.0_update18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1099</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1099" source="CVE"/>
	<description>
	Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052561" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052562" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052563" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052564" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052565" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052566" comment="java-1_5_0-sun less than 1.5.0_update18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1100</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1100" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) "limits on Font creation," aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052561" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052562" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052563" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052564" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052565" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052566" comment="java-1_5_0-sun less than 1.5.0_update18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1101</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1101" source="CVE"/>
	<description>
	Unspecified vulnerability in the lightweight HTTP server implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to cause a denial of service (probably resource consumption) for a JAX-WS service endpoint via a connection without any data, which triggers a file descriptor "leak."
	</description>
 </metadata>
<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1102</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1102" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to "code generation."
	</description>
 </metadata>
<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1103</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1103" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to "deserializing applets," aka CR 6646860.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052561" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052562" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052563" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052564" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052565" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052566" comment="java-1_5_0-sun less than 1.5.0_update18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1104</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1104" source="CVE"/>
	<description>
	The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331.  NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052561" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052562" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052563" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052564" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052565" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052566" comment="java-1_5_0-sun less than 1.5.0_update18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1105</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1105" source="CVE"/>
	<description>
	The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 allows user-assisted remote attackers to cause a trusted applet to run in an older JRE version, which can be used to exploit vulnerabilities in that older version, aka CR 6706490.
	</description>
 </metadata>
<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1106</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1106" source="CVE"/>
	<description>
	The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 does not properly parse crossdomain.xml files, which allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unknown vectors, aka CR 6798948.
	</description>
 </metadata>
<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1107</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1107" source="CVE"/>
	<description>
	The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a "Swing JLabel HTML parsing vulnerability," aka CR 6782871.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052561" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052562" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052563" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052564" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052565" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052566" comment="java-1_5_0-sun less than 1.5.0_update18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052567" comment="java-1_6_0-sun-alsa less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052589" comment="java-1_6_0-sun-devel less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052569" comment="java-1_6_0-sun-jdbc less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052570" comment="java-1_6_0-sun-plugin less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052571" comment="java-1_6_0-sun-src less than 1.6.0.u13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052572" comment="java-1_6_0-sun less than 1.6.0.u13-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1169</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1169" source="CVE"/>
	<description>
	The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox before 3.0.8 and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3dddf5e823b876ce1c3b5bd9784f0837 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052557" comment="MozillaFirefox-branding-upstream less than 3.0.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032330" comment="MozillaFirefox-translations less than 3.0.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032331" comment="MozillaFirefox less than 3.0.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032332" comment="mozilla-xulrunner190-32bit less than 1.9.0.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052540" comment="mozilla-xulrunner190-devel less than 1.9.0.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052541" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032333" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052543" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032334" comment="mozilla-xulrunner190-translations less than 1.9.0.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032336" comment="mozilla-xulrunner190 less than 1.9.0.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052558" comment="python-xpcom190 less than 1.9.0.8-1.1.1"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051780" comment="seamonkey-dom-inspector less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051781" comment="seamonkey-irc less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051782" comment="seamonkey-mail less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051783" comment="seamonkey-spellchecker less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051784" comment="seamonkey-venkman less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051785" comment="seamonkey less than 1.1.16-1.1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1171</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1171" source="CVE"/>
	<description>
	The TeX filter in Moodle 1.6 before 1.6.9+, 1.7 before 1.7.7+, 1.8 before 1.8.9, and 1.9 before 1.9.5 allows user-assisted attackers to read arbitrary files via an input command in a "$$" sequence, which causes LaTeX to include the contents of the file.
	</description>
 </metadata>
<!-- 4448ba0610a42bfa66aa701e40e695ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052657" comment="moodle-af less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052658" comment="moodle-ar less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052659" comment="moodle-be less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052660" comment="moodle-bg less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052661" comment="moodle-bs less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052662" comment="moodle-ca less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052663" comment="moodle-cs less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052664" comment="moodle-da less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052665" comment="moodle-de less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052666" comment="moodle-de_du less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052667" comment="moodle-el less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052668" comment="moodle-es less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052669" comment="moodle-et less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052670" comment="moodle-eu less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052671" comment="moodle-fa less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052672" comment="moodle-fi less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052673" comment="moodle-fr less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052674" comment="moodle-ga less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052675" comment="moodle-gl less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052676" comment="moodle-he less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052677" comment="moodle-hi less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052678" comment="moodle-hr less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052679" comment="moodle-hu less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052680" comment="moodle-id less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052681" comment="moodle-is less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052682" comment="moodle-it less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052683" comment="moodle-ja less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052684" comment="moodle-ka less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052685" comment="moodle-km less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052686" comment="moodle-kn less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052687" comment="moodle-ko less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052688" comment="moodle-lt less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052689" comment="moodle-lv less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052690" comment="moodle-mi_tn less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052691" comment="moodle-ms less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052692" comment="moodle-nl less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052693" comment="moodle-nn less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052694" comment="moodle-no less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052695" comment="moodle-pl less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052696" comment="moodle-pt less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052697" comment="moodle-ro less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052698" comment="moodle-ru less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052699" comment="moodle-sk less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052700" comment="moodle-sl less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052701" comment="moodle-so less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052702" comment="moodle-sq less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052703" comment="moodle-sr less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052704" comment="moodle-sv less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052705" comment="moodle-th less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052706" comment="moodle-tl less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052707" comment="moodle-tr less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052708" comment="moodle-uk less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052709" comment="moodle-vi less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052710" comment="moodle-zh_cn less than 1.9.3-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052711" comment="moodle less than 1.9.3-1.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1179</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179" source="CVE"/>
	<description>
	Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8ab5ee5635df09064e67724be43217 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051818" comment="libpoppler4 less than 0.10.1-1.6.10"/>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051830" comment="kdegraphics3-3D less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051831" comment="kdegraphics3-devel less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051832" comment="kdegraphics3-extra less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051833" comment="kdegraphics3-fax less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051834" comment="kdegraphics3-imaging less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051835" comment="kdegraphics3-kamera less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051836" comment="kdegraphics3-pdf less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051837" comment="kdegraphics3-postscript less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051838" comment="kdegraphics3-scan less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051839" comment="kdegraphics3-tex less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051840" comment="kdegraphics3 less than 3.5.10-1.63.2"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051854" comment="xpdf-tools less than 3.02-97.78.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051855" comment="xpdf less than 3.02-97.78.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1180</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8ab5ee5635df09064e67724be43217 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051818" comment="libpoppler4 less than 0.10.1-1.6.10"/>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051830" comment="kdegraphics3-3D less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051831" comment="kdegraphics3-devel less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051832" comment="kdegraphics3-extra less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051833" comment="kdegraphics3-fax less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051834" comment="kdegraphics3-imaging less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051835" comment="kdegraphics3-kamera less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051836" comment="kdegraphics3-pdf less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051837" comment="kdegraphics3-postscript less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051838" comment="kdegraphics3-scan less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051839" comment="kdegraphics3-tex less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051840" comment="kdegraphics3 less than 3.5.10-1.63.2"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051854" comment="xpdf-tools less than 3.02-97.78.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051855" comment="xpdf less than 3.02-97.78.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1181</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8ab5ee5635df09064e67724be43217 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051818" comment="libpoppler4 less than 0.10.1-1.6.10"/>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051830" comment="kdegraphics3-3D less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051831" comment="kdegraphics3-devel less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051832" comment="kdegraphics3-extra less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051833" comment="kdegraphics3-fax less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051834" comment="kdegraphics3-imaging less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051835" comment="kdegraphics3-kamera less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051836" comment="kdegraphics3-pdf less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051837" comment="kdegraphics3-postscript less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051838" comment="kdegraphics3-scan less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051839" comment="kdegraphics3-tex less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051840" comment="kdegraphics3 less than 3.5.10-1.63.2"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051854" comment="xpdf-tools less than 3.02-97.78.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051855" comment="xpdf less than 3.02-97.78.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1182</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182" source="CVE"/>
	<description>
	Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8ab5ee5635df09064e67724be43217 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051818" comment="libpoppler4 less than 0.10.1-1.6.10"/>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051830" comment="kdegraphics3-3D less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051831" comment="kdegraphics3-devel less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051832" comment="kdegraphics3-extra less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051833" comment="kdegraphics3-fax less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051834" comment="kdegraphics3-imaging less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051835" comment="kdegraphics3-kamera less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051836" comment="kdegraphics3-pdf less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051837" comment="kdegraphics3-postscript less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051838" comment="kdegraphics3-scan less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051839" comment="kdegraphics3-tex less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051840" comment="kdegraphics3 less than 3.5.10-1.63.2"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051854" comment="xpdf-tools less than 3.02-97.78.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051855" comment="xpdf less than 3.02-97.78.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1183</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183" source="CVE"/>
	<description>
	The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8ab5ee5635df09064e67724be43217 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051818" comment="libpoppler4 less than 0.10.1-1.6.10"/>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051830" comment="kdegraphics3-3D less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051831" comment="kdegraphics3-devel less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051832" comment="kdegraphics3-extra less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051833" comment="kdegraphics3-fax less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051834" comment="kdegraphics3-imaging less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051835" comment="kdegraphics3-kamera less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051836" comment="kdegraphics3-pdf less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051837" comment="kdegraphics3-postscript less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051838" comment="kdegraphics3-scan less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051839" comment="kdegraphics3-tex less than 3.5.10-1.63.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051840" comment="kdegraphics3 less than 3.5.10-1.63.2"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051854" comment="xpdf-tools less than 3.02-97.78.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051855" comment="xpdf less than 3.02-97.78.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1185</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1185" source="CVE"/>
	<description>
	udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.
	</description>
 </metadata>
<!-- d740755926641b68adc21863744e2258 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052716" comment="libudev-devel less than 128-9.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052717" comment="libudev0 less than 128-9.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052718" comment="libvolume_id-devel less than 128-9.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052719" comment="libvolume_id1 less than 128-9.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052720" comment="libvolume_id less than 126-17.38.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052721" comment="udev less than 128-9.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1192</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1192" source="CVE"/>
	<description>
	The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.
	</description>
 </metadata>
<!-- 422ef4ba0754718912462fb46d07c13f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052726" comment="aufs-kmp-debug less than cvs20081020_2.6.27.23_0.1-1.32.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052727" comment="aufs-kmp-trace less than cvs20081020_2.6.27.23_0.1-1.32.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052728" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.23_0.1-1.7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052729" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.23_0.1-1.7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052730" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.23_0.1-1.49.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052731" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.23_0.1-1.49.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052732" comment="drbd-kmp-debug less than 8.2.7_2.6.27.23_0.1-1.19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052733" comment="drbd-kmp-trace less than 8.2.7_2.6.27.23_0.1-1.19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052734" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.23_0.1-2.40.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052735" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.23_0.1-2.40.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052736" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.23_0.1-89.11.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052737" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.23_0.1-89.11.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052738" comment="kernel-debug-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052739" comment="kernel-debug-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052740" comment="kernel-debug less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032345" comment="kernel-default-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032339" comment="kernel-default-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032346" comment="kernel-default less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052741" comment="kernel-docs less than 2.6.3-3.13.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032347" comment="kernel-kdump less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032356" comment="kernel-pae-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032341" comment="kernel-pae-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032357" comment="kernel-pae less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032348" comment="kernel-ppc64-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032340" comment="kernel-ppc64-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032349" comment="kernel-ppc64 less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052742" comment="kernel-ps3 less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032350" comment="kernel-source less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032351" comment="kernel-syms less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052743" comment="kernel-trace-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052744" comment="kernel-trace-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052745" comment="kernel-trace less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052746" comment="kernel-vanilla less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032360" comment="kernel-xen-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032342" comment="kernel-xen-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032361" comment="kernel-xen less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052747" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.23_0.1-2.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052748" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.23_0.1-2.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052749" comment="kvm-kmp-trace less than 78_2.6.27.23_0.1-6.6.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052750" comment="kvm-kmp-trace less than 78_2.6.27.23_0.1-6.6.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052751" comment="lirc-kmp-trace less than 0.8.4_2.6.27.23_0.1-0.1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052752" comment="ofed-kmp-debug less than 1.4_2.6.27.23_0.1-21.15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052753" comment="ofed-kmp-trace less than 1.4_2.6.27.23_0.1-21.15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052754" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.23_0.1-2.36.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052755" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.23_0.1-2.36.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052756" comment="pcfclock-kmp-debug less than 0.44_2.6.27.23_0.1-227.56.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052757" comment="pcfclock-kmp-trace less than 0.44_2.6.27.23_0.1-227.56.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052758" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.23_0.1-2.8.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052759" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.23_0.1-2.8.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052760" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.23_0.1-2.8.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052761" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.23_0.1-2.8.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052762" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.23_0.1-5.50.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052763" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.23_0.1-5.50.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1194</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1194" source="CVE"/>
	<description>
	Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a573a9051f013b865d54393922a35ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053613" comment="MozillaFirefox-branding-upstream less than 3.0.12-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053589" comment="MozillaFirefox-translations less than 3.0.12-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053590" comment="MozillaFirefox less than 3.0.12-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053591" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053596" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053597" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053592" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053599" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053593" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053595" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053614" comment="python-xpcom190 less than 1.9.0.12-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 673f29f8ed31c65b1e815da82648689c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057938" comment="pango-32bit less than 1.22.1-2.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057939" comment="pango-64bit less than 1.22.1-2.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057940" comment="pango-devel less than 1.22.1-2.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057941" comment="pango-doc less than 1.22.1-2.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057942" comment="pango-module-thai-lang less than 1.22.1-2.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057943" comment="pango less than 1.22.1-2.13.1"/>
		</criteria>
	</criteria>
	<!-- 76439f6736f481d5f27a487bb08cd7fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052772" comment="pango-32bit less than 1.22.1-2.12.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052773" comment="pango-64bit less than 1.22.1-2.12.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052774" comment="pango-devel less than 1.22.1-2.12.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052775" comment="pango-doc less than 1.22.1-2.12.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052776" comment="pango-module-thai-lang less than 1.22.1-2.12.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052777" comment="pango less than 1.22.1-2.12.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1195</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195" source="CVE"/>
	<description>
	The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
	</description>
 </metadata>
<!-- 0683ec2df667efa4b179f003d0da49d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055738" comment="apache2-devel less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055739" comment="apache2-doc less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055740" comment="apache2-example-pages less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055741" comment="apache2-prefork less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055742" comment="apache2-utils less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055743" comment="apache2-worker less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055744" comment="apache2 less than 2.2.10-2.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1210</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210" source="CVE"/>
	<description>
	Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- ef3e619e4955be6ea79c741d39c2e0c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052785" comment="wireshark-devel less than 1.0.4-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052786" comment="wireshark less than 1.0.4-2.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1234</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1234" source="CVE"/>
	<description>
	Opera 9.64 allows remote attackers to cause a denial of service (application crash) via an XML document containing a long series of start-tags with no corresponding end-tags.  NOTE: it was later reported that 9.52 is also affected.
	</description>
 </metadata>
<!-- a897914e6fa37f606b823ac101036941 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054537" comment="opera less than 10.00-6.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1241</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1241" source="CVE"/>
	<description>
	Unspecified vulnerability in ClamAV before 0.95 allows remote attackers to bypass detection of malware via a modified RAR archive.
	</description>
 </metadata>
<!-- 948121c661973e0f48957c2eceb4541a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051620" comment="clamav-db less than 0.95-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032190" comment="clamav less than 0.95-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1242</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1242" source="CVE"/>
	<description>
	The vmx_set_msr function in arch/x86/kvm/vmx.c in the VMX implementation in the KVM subsystem in the Linux kernel before 2.6.29.1 on the i386 platform allows guest OS users to cause a denial of service (OOPS) by setting the EFER_LME (aka "Long mode enable") bit in the Extended Feature Enable Register (EFER) model-specific register, which is specific to the x86_64 platform.
	</description>
 </metadata>
<!-- 422ef4ba0754718912462fb46d07c13f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052726" comment="aufs-kmp-debug less than cvs20081020_2.6.27.23_0.1-1.32.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052727" comment="aufs-kmp-trace less than cvs20081020_2.6.27.23_0.1-1.32.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052728" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.23_0.1-1.7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052729" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.23_0.1-1.7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052730" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.23_0.1-1.49.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052731" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.23_0.1-1.49.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052732" comment="drbd-kmp-debug less than 8.2.7_2.6.27.23_0.1-1.19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052733" comment="drbd-kmp-trace less than 8.2.7_2.6.27.23_0.1-1.19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052734" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.23_0.1-2.40.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052735" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.23_0.1-2.40.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052736" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.23_0.1-89.11.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052737" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.23_0.1-89.11.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052738" comment="kernel-debug-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052739" comment="kernel-debug-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052740" comment="kernel-debug less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032345" comment="kernel-default-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032339" comment="kernel-default-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032346" comment="kernel-default less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052741" comment="kernel-docs less than 2.6.3-3.13.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032347" comment="kernel-kdump less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032356" comment="kernel-pae-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032341" comment="kernel-pae-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032357" comment="kernel-pae less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032348" comment="kernel-ppc64-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032340" comment="kernel-ppc64-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032349" comment="kernel-ppc64 less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052742" comment="kernel-ps3 less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032350" comment="kernel-source less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032351" comment="kernel-syms less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052743" comment="kernel-trace-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052744" comment="kernel-trace-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052745" comment="kernel-trace less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052746" comment="kernel-vanilla less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032360" comment="kernel-xen-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032342" comment="kernel-xen-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032361" comment="kernel-xen less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052747" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.23_0.1-2.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052748" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.23_0.1-2.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052749" comment="kvm-kmp-trace less than 78_2.6.27.23_0.1-6.6.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052750" comment="kvm-kmp-trace less than 78_2.6.27.23_0.1-6.6.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052751" comment="lirc-kmp-trace less than 0.8.4_2.6.27.23_0.1-0.1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052752" comment="ofed-kmp-debug less than 1.4_2.6.27.23_0.1-21.15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052753" comment="ofed-kmp-trace less than 1.4_2.6.27.23_0.1-21.15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052754" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.23_0.1-2.36.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052755" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.23_0.1-2.36.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052756" comment="pcfclock-kmp-debug less than 0.44_2.6.27.23_0.1-227.56.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052757" comment="pcfclock-kmp-trace less than 0.44_2.6.27.23_0.1-227.56.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052758" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.23_0.1-2.8.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052759" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.23_0.1-2.8.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052760" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.23_0.1-2.8.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052761" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.23_0.1-2.8.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052762" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.23_0.1-5.50.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052763" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.23_0.1-5.50.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1252</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252" source="CVE"/>
	<description>
	Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
	</description>
 </metadata>
<!-- bb0b4578b3b2bd90c300579ef5555ae9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051872" comment="ntp-doc less than 4.2.4p6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051873" comment="ntp less than 4.2.4p6-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1255</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1255" source="CVE"/>
	<description>
	The process_stat function in (1) Memcached before 1.2.8 and (2) MemcacheDB 1.2.0 discloses (a) the contents of /proc/self/maps in response to a stats maps command and (b) memory-allocation statistics in response to a stats malloc command, which allows remote attackers to obtain sensitive information such as the locations of memory regions, and defeat ASLR protection, by sending a command to the daemon's TCP port.
	</description>
 </metadata>
<!-- d817c4c810a64ac81c63c4303c942f8b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053773" comment="memcached less than 1.2.6-5.7.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1265</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1265" source="CVE"/>
	<description>
	Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 2.6.24.4, and other versions before 2.6.30-rc1, might allow remote attackers to obtain sensitive information via a large length value, which causes "garbage" memory to be sent.
	</description>
 </metadata>
<!-- 422ef4ba0754718912462fb46d07c13f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052726" comment="aufs-kmp-debug less than cvs20081020_2.6.27.23_0.1-1.32.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052727" comment="aufs-kmp-trace less than cvs20081020_2.6.27.23_0.1-1.32.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052728" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.23_0.1-1.7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052729" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.23_0.1-1.7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052730" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.23_0.1-1.49.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052731" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.23_0.1-1.49.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052732" comment="drbd-kmp-debug less than 8.2.7_2.6.27.23_0.1-1.19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052733" comment="drbd-kmp-trace less than 8.2.7_2.6.27.23_0.1-1.19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052734" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.23_0.1-2.40.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052735" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.23_0.1-2.40.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052736" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.23_0.1-89.11.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052737" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.23_0.1-89.11.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052738" comment="kernel-debug-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052739" comment="kernel-debug-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052740" comment="kernel-debug less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032345" comment="kernel-default-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032339" comment="kernel-default-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032346" comment="kernel-default less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052741" comment="kernel-docs less than 2.6.3-3.13.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032347" comment="kernel-kdump less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032356" comment="kernel-pae-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032341" comment="kernel-pae-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032357" comment="kernel-pae less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032348" comment="kernel-ppc64-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032340" comment="kernel-ppc64-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032349" comment="kernel-ppc64 less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052742" comment="kernel-ps3 less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032350" comment="kernel-source less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032351" comment="kernel-syms less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052743" comment="kernel-trace-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052744" comment="kernel-trace-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052745" comment="kernel-trace less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052746" comment="kernel-vanilla less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032360" comment="kernel-xen-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032342" comment="kernel-xen-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032361" comment="kernel-xen less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052747" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.23_0.1-2.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052748" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.23_0.1-2.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052749" comment="kvm-kmp-trace less than 78_2.6.27.23_0.1-6.6.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052750" comment="kvm-kmp-trace less than 78_2.6.27.23_0.1-6.6.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052751" comment="lirc-kmp-trace less than 0.8.4_2.6.27.23_0.1-0.1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052752" comment="ofed-kmp-debug less than 1.4_2.6.27.23_0.1-21.15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052753" comment="ofed-kmp-trace less than 1.4_2.6.27.23_0.1-21.15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052754" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.23_0.1-2.36.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052755" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.23_0.1-2.36.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052756" comment="pcfclock-kmp-debug less than 0.44_2.6.27.23_0.1-227.56.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052757" comment="pcfclock-kmp-trace less than 0.44_2.6.27.23_0.1-227.56.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052758" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.23_0.1-2.8.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052759" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.23_0.1-2.8.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052760" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.23_0.1-2.8.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052761" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.23_0.1-2.8.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052762" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.23_0.1-5.50.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052763" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.23_0.1-5.50.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1266</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1266" source="CVE"/>
	<description>
	Unspecified vulnerability in Wireshark before 1.0.7-0.1-1 has unknown impact and attack vectors.
	</description>
 </metadata>
<!-- ef3e619e4955be6ea79c741d39c2e0c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052785" comment="wireshark-devel less than 1.0.4-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052786" comment="wireshark less than 1.0.4-2.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1267</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1267" source="CVE"/>
	<description>
	Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors.
	</description>
 </metadata>
<!-- ef3e619e4955be6ea79c741d39c2e0c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052785" comment="wireshark-devel less than 1.0.4-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052786" comment="wireshark less than 1.0.4-2.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1268</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268" source="CVE"/>
	<description>
	The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet.
	</description>
 </metadata>
<!-- ef3e619e4955be6ea79c741d39c2e0c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052785" comment="wireshark-devel less than 1.0.4-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052786" comment="wireshark less than 1.0.4-2.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1269</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269" source="CVE"/>
	<description>
	Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.
	</description>
 </metadata>
<!-- ef3e619e4955be6ea79c741d39c2e0c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052785" comment="wireshark-devel less than 1.0.4-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052786" comment="wireshark less than 1.0.4-2.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1270</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1270" source="CVE"/>
	<description>
	libclamav/untar.c in ClamAV before 0.95 allows remote attackers to cause a denial of service (infinite loop) via a crafted TAR file that causes (1) clamd and (2) clamscan to hang.
	</description>
 </metadata>
<!-- 948121c661973e0f48957c2eceb4541a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051620" comment="clamav-db less than 0.95-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032190" comment="clamav less than 0.95-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1271</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1271" source="CVE"/>
	<description>
	The JSON_parser function (ext/json/JSON_parser.c) in PHP 5.2.x before 5.2.9 allows remote attackers to cause a denial of service (segmentation fault) via a malformed string to the json_decode API function.
	</description>
 </metadata>
<!-- 3291c2ef45434af34802ca073998445d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051269" comment="apache2-mod_php5 less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051270" comment="php5-bcmath less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051271" comment="php5-bz2 less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051272" comment="php5-calendar less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051273" comment="php5-ctype less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051274" comment="php5-curl less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051275" comment="php5-dba less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051276" comment="php5-dbase less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051277" comment="php5-devel less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051278" comment="php5-dom less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051279" comment="php5-exif less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051280" comment="php5-fastcgi less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051281" comment="php5-ftp less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051282" comment="php5-gd less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051283" comment="php5-gettext less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051284" comment="php5-gmp less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051285" comment="php5-hash less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051286" comment="php5-iconv less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051287" comment="php5-imap less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051288" comment="php5-json less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051289" comment="php5-ldap less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051290" comment="php5-mbstring less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051291" comment="php5-mcrypt less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051292" comment="php5-mysql less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051293" comment="php5-ncurses less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051294" comment="php5-odbc less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051295" comment="php5-openssl less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051296" comment="php5-pcntl less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051297" comment="php5-pdo less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051298" comment="php5-pear less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051299" comment="php5-pgsql less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051300" comment="php5-posix less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051301" comment="php5-pspell less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051302" comment="php5-readline less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051303" comment="php5-shmop less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051304" comment="php5-snmp less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051305" comment="php5-soap less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051306" comment="php5-sockets less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051307" comment="php5-sqlite less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051308" comment="php5-suhosin less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051309" comment="php5-sysvmsg less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051310" comment="php5-sysvsem less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051311" comment="php5-sysvshm less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051312" comment="php5-tidy less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051313" comment="php5-tokenizer less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051314" comment="php5-wddx less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051315" comment="php5-xmlreader less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051316" comment="php5-xmlrpc less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051317" comment="php5-xmlwriter less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051318" comment="php5-xsl less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051319" comment="php5-zip less than 5.2.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051320" comment="php5-zlib less than 5.2.9-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1274</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1274" source="CVE"/>
	<description>
	Integer overflow in the qt_error parse_trak_atom function in demuxers/demux_qt.c in xine-lib 1.1.16.2 and earlier allows remote attackers to execute arbitrary code via a Quicktime movie file with a large count value in an STTS atom, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- c234ca5ae5a5cb0c5d4504154c7d7b67 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052795" comment="libxine1-32bit less than 1.1.15-23.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052796" comment="libxine1 less than 1.1.15-23.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1295</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1295" source="CVE"/>
	<description>
	Apport before 0.108.4 on Ubuntu 8.04 LTS, before 0.119.2 on Ubuntu 8.10, and before 1.0-0ubuntu5.2 on Ubuntu 9.04 does not properly remove files from the application's crash-report directory, which allows local users to delete arbitrary files via unspecified vectors.
	</description>
 </metadata>
<!-- 2f3d7fe9ce243ad088f3b601325960a3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052809" comment="apport-crashdb-opensuse less than 0.114-8.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052810" comment="apport-gtk less than 0.114-8.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052811" comment="apport-qt less than 0.114-8.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052812" comment="apport-retrace less than 0.114-8.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052813" comment="apport less than 0.114-8.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1297</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1297" source="CVE"/>
	<description>
	iscsi_discovery in open-iscsi in SUSE openSUSE 10.3 through 11.1 and SUSE Linux Enterprise (SLE) 10 SP2 and 11 allows local users to overwrite arbitrary files via a symlink attack on an unspecified temporary file that has a predictable name.
	</description>
 </metadata>
<!-- 8aff10152745aafe128363463ebb5010 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054874" comment="open-iscsi less than 2.0.870-21.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1299</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1299" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1299" source="CVE"/>
	<description>
	The pa_make_secure_dir function in core-util.c in PulseAudio 0.9.10 and 0.9.19 allows local users to change the ownership and permissions of arbitrary files via a symlink attack on a /tmp/.esd-##### temporary file.
	</description>
 </metadata>
<!-- f4a975e46fa974665f0b69b19ac43148 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058983" comment="libpulse-browse0 less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058984" comment="libpulse-devel less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058985" comment="libpulse-mainloop-glib0 less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058986" comment="libpulse0-32bit less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058987" comment="libpulse0 less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058988" comment="pulseaudio-esound-compat less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058989" comment="pulseaudio-lang less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058990" comment="pulseaudio-module-bluetooth less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058991" comment="pulseaudio-module-gconf less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058992" comment="pulseaudio-module-jack less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058993" comment="pulseaudio-module-lirc less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058994" comment="pulseaudio-module-x11 less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058995" comment="pulseaudio-module-zeroconf less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058996" comment="pulseaudio-utils less than 0.9.14-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058997" comment="pulseaudio less than 0.9.14-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1302</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1302" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to (1) nsAsyncInstantiateEvent::Run, (2) nsStyleContext::Destroy, (3) nsComputedDOMStyle::GetWidth, (4) the xslt_attributeset_ImportSameName.html test case for the XSLT stylesheet compiler, (5) nsXULDocument::SynchronizeBroadcastListener, (6) IsBindingAncestor, (7) PL_DHashTableOperate and nsEditor::EndUpdateViewBatch, and (8) gfxSkipCharsIterator::SetOffsets, and other vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08a92c44781debfd0a127ac9dedd8ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032269" comment="mozilla-xulrunner190-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052297" comment="mozilla-xulrunner190-devel less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052298" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032270" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052299" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032271" comment="mozilla-xulrunner190-translations less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032273" comment="mozilla-xulrunner190 less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052300" comment="python-xpcom190 less than 1.9.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053247" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053248" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053249" comment="MozillaThunderbird less than 2.0.0.22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- f63cb107640bdca2da33aa6f5eb30267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052303" comment="MozillaFirefox-branding-upstream less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032267" comment="MozillaFirefox-translations less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032268" comment="MozillaFirefox less than 3.0.9-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1303</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to nsSVGElement::BindToTree.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08a92c44781debfd0a127ac9dedd8ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032269" comment="mozilla-xulrunner190-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052297" comment="mozilla-xulrunner190-devel less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052298" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032270" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052299" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032271" comment="mozilla-xulrunner190-translations less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032273" comment="mozilla-xulrunner190 less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052300" comment="python-xpcom190 less than 1.9.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051780" comment="seamonkey-dom-inspector less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051781" comment="seamonkey-irc less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051782" comment="seamonkey-mail less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051783" comment="seamonkey-spellchecker less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051784" comment="seamonkey-venkman less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051785" comment="seamonkey less than 1.1.16-1.1.2"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053247" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053248" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053249" comment="MozillaThunderbird less than 2.0.0.22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- f63cb107640bdca2da33aa6f5eb30267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052303" comment="MozillaFirefox-branding-upstream less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032267" comment="MozillaFirefox-translations less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032268" comment="MozillaFirefox less than 3.0.9-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1304</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1304" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving (1) js_FindPropertyHelper, related to the definitions of Math and Date; and (2) js_CheckRedeclaration.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08a92c44781debfd0a127ac9dedd8ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032269" comment="mozilla-xulrunner190-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052297" comment="mozilla-xulrunner190-devel less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052298" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032270" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052299" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032271" comment="mozilla-xulrunner190-translations less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032273" comment="mozilla-xulrunner190 less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052300" comment="python-xpcom190 less than 1.9.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053247" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053248" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053249" comment="MozillaThunderbird less than 2.0.0.22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- f63cb107640bdca2da33aa6f5eb30267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052303" comment="MozillaFirefox-branding-upstream less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032267" comment="MozillaFirefox-translations less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032268" comment="MozillaFirefox less than 3.0.9-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1305</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1305" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving JSOP_DEFVAR and properties that lack the JSPROP_PERMANENT attribute.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08a92c44781debfd0a127ac9dedd8ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032269" comment="mozilla-xulrunner190-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052297" comment="mozilla-xulrunner190-devel less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052298" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032270" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052299" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032271" comment="mozilla-xulrunner190-translations less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032273" comment="mozilla-xulrunner190 less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052300" comment="python-xpcom190 less than 1.9.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051780" comment="seamonkey-dom-inspector less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051781" comment="seamonkey-irc less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051782" comment="seamonkey-mail less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051783" comment="seamonkey-spellchecker less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051784" comment="seamonkey-venkman less than 1.1.16-1.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051785" comment="seamonkey less than 1.1.16-1.1.2"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053247" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053248" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053249" comment="MozillaThunderbird less than 2.0.0.22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- f63cb107640bdca2da33aa6f5eb30267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052303" comment="MozillaFirefox-branding-upstream less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032267" comment="MozillaFirefox-translations less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032268" comment="MozillaFirefox less than 3.0.9-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1306</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1306" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306" source="CVE"/>
	<description>
	The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08a92c44781debfd0a127ac9dedd8ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032269" comment="mozilla-xulrunner190-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052297" comment="mozilla-xulrunner190-devel less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052298" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032270" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052299" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032271" comment="mozilla-xulrunner190-translations less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032273" comment="mozilla-xulrunner190 less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052300" comment="python-xpcom190 less than 1.9.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- f63cb107640bdca2da33aa6f5eb30267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052303" comment="MozillaFirefox-branding-upstream less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032267" comment="MozillaFirefox-translations less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032268" comment="MozillaFirefox less than 3.0.9-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1307</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307" source="CVE"/>
	<description>
	The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08a92c44781debfd0a127ac9dedd8ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032269" comment="mozilla-xulrunner190-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052297" comment="mozilla-xulrunner190-devel less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052298" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032270" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052299" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032271" comment="mozilla-xulrunner190-translations less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032273" comment="mozilla-xulrunner190 less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052300" comment="python-xpcom190 less than 1.9.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055407" comment="seamonkey-dom-inspector less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055408" comment="seamonkey-irc less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055409" comment="seamonkey-mail less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055410" comment="seamonkey-spellchecker less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055411" comment="seamonkey-venkman less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055412" comment="seamonkey less than 1.1.18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053247" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053248" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053249" comment="MozillaThunderbird less than 2.0.0.22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- f63cb107640bdca2da33aa6f5eb30267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052303" comment="MozillaFirefox-branding-upstream less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032267" comment="MozillaFirefox-translations less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032268" comment="MozillaFirefox less than 3.0.9-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1308</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1308" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey allows remote attackers to inject arbitrary web script or HTML via vectors involving XBL JavaScript bindings and remote stylesheets, as exploited in the wild by a March 2009 eBay listing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08a92c44781debfd0a127ac9dedd8ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032269" comment="mozilla-xulrunner190-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052297" comment="mozilla-xulrunner190-devel less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052298" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032270" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052299" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032271" comment="mozilla-xulrunner190-translations less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032273" comment="mozilla-xulrunner190 less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052300" comment="python-xpcom190 less than 1.9.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- f63cb107640bdca2da33aa6f5eb30267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052303" comment="MozillaFirefox-branding-upstream less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032267" comment="MozillaFirefox-translations less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032268" comment="MozillaFirefox less than 3.0.9-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1309</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey do not properly implement the Same Origin Policy for (1) XMLHttpRequest, involving a mismatch for a document's principal, and (2) XPCNativeWrapper.toString, involving an incorrect __proto__ scope, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via a crafted document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08a92c44781debfd0a127ac9dedd8ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032269" comment="mozilla-xulrunner190-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052297" comment="mozilla-xulrunner190-devel less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052298" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032270" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052299" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032271" comment="mozilla-xulrunner190-translations less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032273" comment="mozilla-xulrunner190 less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052300" comment="python-xpcom190 less than 1.9.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- f63cb107640bdca2da33aa6f5eb30267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052303" comment="MozillaFirefox-branding-upstream less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032267" comment="MozillaFirefox-translations less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032268" comment="MozillaFirefox less than 3.0.9-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1310</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1310" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the MozSearch plugin implementation in Mozilla Firefox before 3.0.9 allows user-assisted remote attackers to inject arbitrary web script or HTML via a javascript: URI in the SearchForm element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08a92c44781debfd0a127ac9dedd8ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032269" comment="mozilla-xulrunner190-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052297" comment="mozilla-xulrunner190-devel less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052298" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032270" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052299" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032271" comment="mozilla-xulrunner190-translations less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032273" comment="mozilla-xulrunner190 less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052300" comment="python-xpcom190 less than 1.9.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- f63cb107640bdca2da33aa6f5eb30267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052303" comment="MozillaFirefox-branding-upstream less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032267" comment="MozillaFirefox-translations less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032268" comment="MozillaFirefox less than 3.0.9-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1311</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.9 and SeaMonkey before 1.1.17 allow user-assisted remote attackers to obtain sensitive information via a web page with an embedded frame, which causes POST data from an outer page to be sent to the inner frame's URL during a SAVEMODE_FILEONLY save of the inner frame.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08a92c44781debfd0a127ac9dedd8ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032269" comment="mozilla-xulrunner190-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052297" comment="mozilla-xulrunner190-devel less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052298" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032270" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052299" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032271" comment="mozilla-xulrunner190-translations less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032273" comment="mozilla-xulrunner190 less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052300" comment="python-xpcom190 less than 1.9.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055407" comment="seamonkey-dom-inspector less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055408" comment="seamonkey-irc less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055409" comment="seamonkey-mail less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055410" comment="seamonkey-spellchecker less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055411" comment="seamonkey-venkman less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055412" comment="seamonkey less than 1.1.18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- f63cb107640bdca2da33aa6f5eb30267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052303" comment="MozillaFirefox-branding-upstream less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032267" comment="MozillaFirefox-translations less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032268" comment="MozillaFirefox less than 3.0.9-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1312</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1312" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.9 and SeaMonkey 1.1.17 do not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header. NOTE: it was later reported that Firefox 3.6 a1 pre and Mozilla 1.7.x and earlier are also affected.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08a92c44781debfd0a127ac9dedd8ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032269" comment="mozilla-xulrunner190-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052297" comment="mozilla-xulrunner190-devel less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052298" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032270" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052299" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032271" comment="mozilla-xulrunner190-translations less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032273" comment="mozilla-xulrunner190 less than 1.9.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052300" comment="python-xpcom190 less than 1.9.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- f63cb107640bdca2da33aa6f5eb30267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052303" comment="MozillaFirefox-branding-upstream less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032267" comment="MozillaFirefox-translations less than 3.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032268" comment="MozillaFirefox less than 3.0.9-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1313</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1313" source="CVE"/>
	<description>
	The nsTextFrame::ClearTextRun function in layout/generic/nsTextFrameThebes.cpp in Mozilla Firefox 3.0.9 allows remote attackers to cause a denial of service (memory corruption) and probably execute arbitrary code via unspecified vectors.  NOTE: this vulnerability reportedly exists because of an incorrect fix for CVE-2009-1302.
	</description>
 </metadata>
<!-- 4f5cd2df5cb713442e1d0fb60f99ed76 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052826" comment="MozillaFirefox-branding-upstream less than 3.0.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032367" comment="MozillaFirefox-translations less than 3.0.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032368" comment="MozillaFirefox less than 3.0.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032369" comment="mozilla-xulrunner190-32bit less than 1.9.0.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052827" comment="mozilla-xulrunner190-devel less than 1.9.0.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052828" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032370" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052829" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032371" comment="mozilla-xulrunner190-translations less than 1.9.0.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032373" comment="mozilla-xulrunner190 less than 1.9.0.10-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052830" comment="python-xpcom190 less than 1.9.0.10-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1337</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337" source="CVE"/>
	<description>
	The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.
	</description>
 </metadata>
<!-- 422ef4ba0754718912462fb46d07c13f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052726" comment="aufs-kmp-debug less than cvs20081020_2.6.27.23_0.1-1.32.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052727" comment="aufs-kmp-trace less than cvs20081020_2.6.27.23_0.1-1.32.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052728" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.23_0.1-1.7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052729" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.23_0.1-1.7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052730" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.23_0.1-1.49.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052731" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.23_0.1-1.49.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052732" comment="drbd-kmp-debug less than 8.2.7_2.6.27.23_0.1-1.19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052733" comment="drbd-kmp-trace less than 8.2.7_2.6.27.23_0.1-1.19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052734" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.23_0.1-2.40.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052735" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.23_0.1-2.40.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052736" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.23_0.1-89.11.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052737" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.23_0.1-89.11.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052738" comment="kernel-debug-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052739" comment="kernel-debug-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052740" comment="kernel-debug less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032345" comment="kernel-default-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032339" comment="kernel-default-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032346" comment="kernel-default less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052741" comment="kernel-docs less than 2.6.3-3.13.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032347" comment="kernel-kdump less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032356" comment="kernel-pae-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032341" comment="kernel-pae-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032357" comment="kernel-pae less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032348" comment="kernel-ppc64-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032340" comment="kernel-ppc64-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032349" comment="kernel-ppc64 less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052742" comment="kernel-ps3 less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032350" comment="kernel-source less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032351" comment="kernel-syms less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052743" comment="kernel-trace-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052744" comment="kernel-trace-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052745" comment="kernel-trace less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052746" comment="kernel-vanilla less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032360" comment="kernel-xen-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032342" comment="kernel-xen-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032361" comment="kernel-xen less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052747" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.23_0.1-2.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052748" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.23_0.1-2.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052749" comment="kvm-kmp-trace less than 78_2.6.27.23_0.1-6.6.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052750" comment="kvm-kmp-trace less than 78_2.6.27.23_0.1-6.6.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052751" comment="lirc-kmp-trace less than 0.8.4_2.6.27.23_0.1-0.1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052752" comment="ofed-kmp-debug less than 1.4_2.6.27.23_0.1-21.15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052753" comment="ofed-kmp-trace less than 1.4_2.6.27.23_0.1-21.15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052754" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.23_0.1-2.36.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052755" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.23_0.1-2.36.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052756" comment="pcfclock-kmp-debug less than 0.44_2.6.27.23_0.1-227.56.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052757" comment="pcfclock-kmp-trace less than 0.44_2.6.27.23_0.1-227.56.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052758" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.23_0.1-2.8.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052759" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.23_0.1-2.8.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052760" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.23_0.1-2.8.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052761" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.23_0.1-2.8.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052762" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.23_0.1-5.50.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052763" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.23_0.1-5.50.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1360</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1360" source="CVE"/>
	<description>
	The __inet6_check_established function in net/ipv6/inet6_hashtables.c in the Linux kernel before 2.6.29, when Network Namespace Support (aka NET_NS) is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via vectors involving IPv6 packets.
	</description>
 </metadata>
<!-- 422ef4ba0754718912462fb46d07c13f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052726" comment="aufs-kmp-debug less than cvs20081020_2.6.27.23_0.1-1.32.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052727" comment="aufs-kmp-trace less than cvs20081020_2.6.27.23_0.1-1.32.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052728" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.23_0.1-1.7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052729" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.23_0.1-1.7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052730" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.23_0.1-1.49.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052731" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.23_0.1-1.49.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052732" comment="drbd-kmp-debug less than 8.2.7_2.6.27.23_0.1-1.19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052733" comment="drbd-kmp-trace less than 8.2.7_2.6.27.23_0.1-1.19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052734" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.23_0.1-2.40.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052735" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.23_0.1-2.40.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052736" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.23_0.1-89.11.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052737" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.23_0.1-89.11.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052738" comment="kernel-debug-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052739" comment="kernel-debug-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052740" comment="kernel-debug less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032345" comment="kernel-default-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032339" comment="kernel-default-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032346" comment="kernel-default less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052741" comment="kernel-docs less than 2.6.3-3.13.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032347" comment="kernel-kdump less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032356" comment="kernel-pae-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032341" comment="kernel-pae-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032357" comment="kernel-pae less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032348" comment="kernel-ppc64-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032340" comment="kernel-ppc64-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032349" comment="kernel-ppc64 less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052742" comment="kernel-ps3 less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032350" comment="kernel-source less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032351" comment="kernel-syms less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052743" comment="kernel-trace-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052744" comment="kernel-trace-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052745" comment="kernel-trace less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052746" comment="kernel-vanilla less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032360" comment="kernel-xen-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032342" comment="kernel-xen-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032361" comment="kernel-xen less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052747" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.23_0.1-2.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052748" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.23_0.1-2.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052749" comment="kvm-kmp-trace less than 78_2.6.27.23_0.1-6.6.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052750" comment="kvm-kmp-trace less than 78_2.6.27.23_0.1-6.6.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052751" comment="lirc-kmp-trace less than 0.8.4_2.6.27.23_0.1-0.1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052752" comment="ofed-kmp-debug less than 1.4_2.6.27.23_0.1-21.15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052753" comment="ofed-kmp-trace less than 1.4_2.6.27.23_0.1-21.15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052754" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.23_0.1-2.36.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052755" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.23_0.1-2.36.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052756" comment="pcfclock-kmp-debug less than 0.44_2.6.27.23_0.1-227.56.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052757" comment="pcfclock-kmp-trace less than 0.44_2.6.27.23_0.1-227.56.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052758" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.23_0.1-2.8.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052759" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.23_0.1-2.8.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052760" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.23_0.1-2.8.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052761" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.23_0.1-2.8.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052762" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.23_0.1-5.50.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052763" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.23_0.1-5.50.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1364</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364" source="CVE"/>
	<description>
	Use-after-free vulnerability in the embedded GD library in libwmf 0.2.8.4 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WMF file.
	</description>
 </metadata>
<!-- 5e643f8e17ec2f8a91e6fe4b345c1bdb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052836" comment="libwmf-32bit less than 0.2.8.4-206.24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052837" comment="libwmf-64bit less than 0.2.8.4-206.24.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052838" comment="libwmf-devel less than 0.2.8.4-206.24.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052839" comment="libwmf-devel less than 0.2.8.4-206.24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052840" comment="libwmf-gnome-32bit less than 0.2.8.4-206.24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052841" comment="libwmf-gnome-64bit less than 0.2.8.4-206.24.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052842" comment="libwmf-gnome less than 0.2.8.4-206.24.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052843" comment="libwmf-gnome less than 0.2.8.4-206.24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052844" comment="libwmf less than 0.2.8.4-206.24.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052845" comment="libwmf less than 0.2.8.4-206.24.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1371</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1371" source="CVE"/>
	<description>
	The CLI_ISCONTAINED macro in libclamav/others.h in ClamAV before 0.95.1 allows remote attackers to cause a denial of service (application crash) via a malformed file with UPack encoding.
	</description>
 </metadata>
<!-- 97b200c6344514e54644f97928645c7e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052856" comment="clamav-db less than 0.95.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052857" comment="clamav less than 0.95.1-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1372</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1372" source="CVE"/>
	<description>
	Stack-based buffer overflow in the cli_url_canon function in libclamav/phishcheck.c in ClamAV before 0.95.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted URL.
	</description>
 </metadata>
<!-- 97b200c6344514e54644f97928645c7e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052856" comment="clamav-db less than 0.95.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052857" comment="clamav less than 0.95.1-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1373</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373" source="CVE"/>
	<description>
	Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin (formerly Gaim) before 2.5.6 allows remote authenticated users to execute arbitrary code via vectors involving an outbound XMPP file transfer.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- c6e96ee2134421d222e8156b30505732 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053491" comment="finch-devel less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053492" comment="finch less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053493" comment="libpurple-devel less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053494" comment="libpurple-lang less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053495" comment="libpurple-meanwhile less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053496" comment="libpurple-mono less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053497" comment="libpurple less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053498" comment="pidgin-devel less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053499" comment="pidgin less than 2.5.1-3.12.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1375</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375" source="CVE"/>
	<description>
	The PurpleCircBuffer implementation in Pidgin (formerly Gaim) before 2.5.6 does not properly maintain a certain buffer, which allows remote attackers to cause a denial of service (memory corruption and application crash) via vectors involving the (1) XMPP or (2) Sametime protocol.
	</description>
 </metadata>
<!-- c6e96ee2134421d222e8156b30505732 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053491" comment="finch-devel less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053492" comment="finch less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053493" comment="libpurple-devel less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053494" comment="libpurple-lang less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053495" comment="libpurple-meanwhile less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053496" comment="libpurple-mono less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053497" comment="libpurple less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053498" comment="pidgin-devel less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053499" comment="pidgin less than 2.5.1-3.12.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1376</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376" source="CVE"/>
	<description>
	Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows.  NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.
	</description>
 </metadata>
<!-- c6e96ee2134421d222e8156b30505732 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053491" comment="finch-devel less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053492" comment="finch less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053493" comment="libpurple-devel less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053494" comment="libpurple-lang less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053495" comment="libpurple-meanwhile less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053496" comment="libpurple-mono less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053497" comment="libpurple less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053498" comment="pidgin-devel less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053499" comment="pidgin less than 2.5.1-3.12.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1377</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377" source="CVE"/>
	<description>
	The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
	</description>
 </metadata>
<!-- c41e30e42fd96b19a8dc51a1a5bee76d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052873" comment="libopenssl-devel less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052874" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052875" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052876" comment="libopenssl0_9_8 less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052877" comment="openssl-certs less than 0.9.8h-25.2.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052878" comment="openssl-doc less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052879" comment="openssl less than 0.9.8h-28.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1378</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378" source="CVE"/>
	<description>
	Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."
	</description>
 </metadata>
<!-- c41e30e42fd96b19a8dc51a1a5bee76d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052873" comment="libopenssl-devel less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052874" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052875" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052876" comment="libopenssl0_9_8 less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052877" comment="openssl-certs less than 0.9.8h-25.2.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052878" comment="openssl-doc less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052879" comment="openssl less than 0.9.8h-28.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1379</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379" source="CVE"/>
	<description>
	Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.
	</description>
 </metadata>
<!-- c41e30e42fd96b19a8dc51a1a5bee76d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052873" comment="libopenssl-devel less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052874" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052875" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052876" comment="libopenssl0_9_8 less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052877" comment="openssl-certs less than 0.9.8h-25.2.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052878" comment="openssl-doc less than 0.9.8h-28.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052879" comment="openssl less than 0.9.8h-28.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1385</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1385" source="CVE"/>
	<description>
	Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
	</description>
 </metadata>
<!-- 632ab7317ff05e3ac65e3c809b3cc815 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053548" comment="aufs-kmp-debug less than cvs20081020_2.6.27.25_0.1-1.32.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053549" comment="aufs-kmp-trace less than cvs20081020_2.6.27.25_0.1-1.32.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053550" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.25_0.1-1.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053551" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.25_0.1-1.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053552" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.25_0.1-1.49.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053553" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.25_0.1-1.49.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053554" comment="drbd-kmp-debug less than 8.2.7_2.6.27.25_0.1-1.19.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053555" comment="drbd-kmp-trace less than 8.2.7_2.6.27.25_0.1-1.19.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053556" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.25_0.1-2.40.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053557" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.25_0.1-2.40.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053558" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.25_0.1-89.11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053559" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.25_0.1-89.11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053560" comment="kernel-debug-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053561" comment="kernel-debug-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053562" comment="kernel-debug less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053523" comment="kernel-default-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053546" comment="kernel-default-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053524" comment="kernel-default less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053563" comment="kernel-docs less than 2.6.3-3.13.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053531" comment="kernel-kdump less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053536" comment="kernel-pae-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053564" comment="kernel-pae-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053537" comment="kernel-pae less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053532" comment="kernel-ppc64-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053565" comment="kernel-ppc64-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053533" comment="kernel-ppc64 less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053566" comment="kernel-ps3 less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053525" comment="kernel-source less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053526" comment="kernel-syms less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053567" comment="kernel-trace-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053568" comment="kernel-trace-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053569" comment="kernel-trace less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053570" comment="kernel-vanilla less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053527" comment="kernel-xen-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053547" comment="kernel-xen-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053528" comment="kernel-xen less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053571" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.25_0.1-2.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053572" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.25_0.1-2.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053573" comment="kvm-kmp-trace less than 78_2.6.27.25_0.1-6.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053574" comment="lirc-kmp-trace less than 0.8.4_2.6.27.25_0.1-0.1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053575" comment="ofed-kmp-debug less than 1.4_2.6.27.25_0.1-21.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053576" comment="ofed-kmp-trace less than 1.4_2.6.27.25_0.1-21.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053577" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.25_0.1-2.36.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053578" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.25_0.1-2.36.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053579" comment="pcfclock-kmp-debug less than 0.44_2.6.27.25_0.1-227.56.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053580" comment="pcfclock-kmp-trace less than 0.44_2.6.27.25_0.1-227.56.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053581" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.25_0.1-2.8.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053582" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.25_0.1-2.8.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053583" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.25_0.1-5.50.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053584" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.25_0.1-5.50.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1386</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386" source="CVE"/>
	<description>
	ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
	</description>
 </metadata>
<!-- d61b958f83fd5574bef883709c573315 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052897" comment="libopenssl-devel less than 0.9.8h-28.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052898" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052899" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052900" comment="libopenssl0_9_8 less than 0.9.8h-28.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052901" comment="openssl-certs less than 0.9.8h-25.2.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052902" comment="openssl-doc less than 0.9.8h-28.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052903" comment="openssl less than 0.9.8h-28.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1387</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387" source="CVE"/>
	<description>
	The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
	</description>
 </metadata>
<!-- d61b958f83fd5574bef883709c573315 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052897" comment="libopenssl-devel less than 0.9.8h-28.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052898" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052899" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052900" comment="libopenssl0_9_8 less than 0.9.8h-28.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052901" comment="openssl-certs less than 0.9.8h-25.2.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052902" comment="openssl-doc less than 0.9.8h-28.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052903" comment="openssl less than 0.9.8h-28.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1389</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1389" source="CVE"/>
	<description>
	Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 574a4c9c3e74805d1c0c29cf29aa4953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061671" comment="kernel-debug-base less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061672" comment="kernel-debug-extra less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061673" comment="kernel-debug less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061674" comment="kernel-default-base less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061675" comment="kernel-default-extra less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061676" comment="kernel-default less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061677" comment="kernel-docs less than 2.6.3-3.13.109"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061678" comment="kernel-kdump less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061679" comment="kernel-pae-base less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061680" comment="kernel-pae-extra less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061681" comment="kernel-pae less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061682" comment="kernel-ppc64-base less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061683" comment="kernel-ppc64-extra less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061684" comment="kernel-ppc64 less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061685" comment="kernel-ps3 less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061686" comment="kernel-source less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061687" comment="kernel-syms less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061688" comment="kernel-trace-base less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061689" comment="kernel-trace-extra less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061690" comment="kernel-trace less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061691" comment="kernel-vanilla less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061692" comment="kernel-xen-base less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061693" comment="kernel-xen-extra less than 2.6.27.48-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061694" comment="kernel-xen less than 2.6.27.48-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 632ab7317ff05e3ac65e3c809b3cc815 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053548" comment="aufs-kmp-debug less than cvs20081020_2.6.27.25_0.1-1.32.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053549" comment="aufs-kmp-trace less than cvs20081020_2.6.27.25_0.1-1.32.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053550" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.25_0.1-1.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053551" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.25_0.1-1.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053552" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.25_0.1-1.49.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053553" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.25_0.1-1.49.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053554" comment="drbd-kmp-debug less than 8.2.7_2.6.27.25_0.1-1.19.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053555" comment="drbd-kmp-trace less than 8.2.7_2.6.27.25_0.1-1.19.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053556" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.25_0.1-2.40.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053557" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.25_0.1-2.40.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053558" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.25_0.1-89.11.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053559" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.25_0.1-89.11.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053560" comment="kernel-debug-base less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053561" comment="kernel-debug-extra less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053562" comment="kernel-debug less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053523" comment="kernel-default-base less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053546" comment="kernel-default-extra less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053524" comment="kernel-default less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053563" comment="kernel-docs less than 2.6.3-3.13.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053531" comment="kernel-kdump less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053536" comment="kernel-pae-base less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053564" comment="kernel-pae-extra less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053537" comment="kernel-pae less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053532" comment="kernel-ppc64-base less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053565" comment="kernel-ppc64-extra less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053533" comment="kernel-ppc64 less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053566" comment="kernel-ps3 less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053525" comment="kernel-source less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053526" comment="kernel-syms less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053567" comment="kernel-trace-base less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053568" comment="kernel-trace-extra less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053569" comment="kernel-trace less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053570" comment="kernel-vanilla less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053527" comment="kernel-xen-base less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053547" comment="kernel-xen-extra less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053528" comment="kernel-xen less than 2.6.27.25-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053571" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.25_0.1-2.1.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053572" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.25_0.1-2.1.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053573" comment="kvm-kmp-trace less than 78_2.6.27.25_0.1-6.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053574" comment="lirc-kmp-trace less than 0.8.4_2.6.27.25_0.1-0.1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053575" comment="ofed-kmp-debug less than 1.4_2.6.27.25_0.1-21.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053576" comment="ofed-kmp-trace less than 1.4_2.6.27.25_0.1-21.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053577" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.25_0.1-2.36.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053578" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.25_0.1-2.36.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053579" comment="pcfclock-kmp-debug less than 0.44_2.6.27.25_0.1-227.56.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053580" comment="pcfclock-kmp-trace less than 0.44_2.6.27.25_0.1-227.56.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053581" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.25_0.1-2.8.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053582" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.25_0.1-2.8.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053583" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.25_0.1-5.50.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053584" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.25_0.1-5.50.35"/>
		</criteria>
	</criteria>
	<!-- 9ea1d108afb7e0239650848c8d9cd8fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054196" comment="aufs-kmp-debug less than cvs20081020_2.6.27.29_0.1-1.32.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054197" comment="aufs-kmp-trace less than cvs20081020_2.6.27.29_0.1-1.32.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054198" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.29_0.1-1.8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054199" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.29_0.1-1.8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054200" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.29_0.1-1.49.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054201" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.29_0.1-1.49.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054202" comment="drbd-kmp-debug less than 8.2.7_2.6.27.29_0.1-1.19.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054203" comment="drbd-kmp-trace less than 8.2.7_2.6.27.29_0.1-1.19.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054204" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.29_0.1-2.40.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054205" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.29_0.1-2.40.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054206" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.29_0.1-89.11.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054207" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.29_0.1-89.11.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054208" comment="kernel-debug-base less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054209" comment="kernel-debug-extra less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054210" comment="kernel-debug less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054108" comment="kernel-default-base less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054182" comment="kernel-default-extra less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054109" comment="kernel-default less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054211" comment="kernel-docs less than 2.6.3-3.13.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054180" comment="kernel-ec2-base less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054212" comment="kernel-ec2-extra less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054181" comment="kernel-ec2 less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054119" comment="kernel-kdump less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054110" comment="kernel-pae-base less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054183" comment="kernel-pae-extra less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054111" comment="kernel-pae less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054120" comment="kernel-ppc64-base less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054213" comment="kernel-ppc64-extra less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054121" comment="kernel-ppc64 less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054214" comment="kernel-ps3 less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054112" comment="kernel-source less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054113" comment="kernel-syms less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054215" comment="kernel-trace-base less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054216" comment="kernel-trace-extra less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054217" comment="kernel-trace less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054218" comment="kernel-vanilla less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054116" comment="kernel-xen-base less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054184" comment="kernel-xen-extra less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054117" comment="kernel-xen less than 2.6.27.29-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054219" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.29_0.1-2.1.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054220" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.29_0.1-2.1.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054221" comment="kvm-kmp-trace less than 78_2.6.27.29_0.1-6.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054222" comment="lirc-kmp-trace less than 0.8.4_2.6.27.29_0.1-0.1.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054223" comment="ofed-kmp-debug less than 1.4_2.6.27.29_0.1-21.16.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054224" comment="ofed-kmp-trace less than 1.4_2.6.27.29_0.1-21.16.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054225" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.29_0.1-2.36.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054226" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.29_0.1-2.36.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054227" comment="pcfclock-kmp-debug less than 0.44_2.6.27.29_0.1-227.56.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054228" comment="pcfclock-kmp-trace less than 0.44_2.6.27.29_0.1-227.56.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054229" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.29_0.1-2.8.55"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054230" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.29_0.1-2.8.55"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054231" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.29_0.1-5.50.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054232" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.29_0.1-5.50.37"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1391</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1391" source="CVE"/>
	<description>
	Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.
	</description>
 </metadata>
<!-- 245bd1e4d2a226251a8dc461f334806c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052909" comment="perl-32bit less than 5.10.0-62.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052910" comment="perl-64bit less than 5.10.0-62.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052911" comment="perl-base-32bit less than 5.10.0-62.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052912" comment="perl-base-64bit less than 5.10.0-62.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052913" comment="perl-base less than 5.10.0-62.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052914" comment="perl-doc less than 5.10.0-62.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052915" comment="perl less than 5.10.0-62.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1392</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 3 before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsEventStateManager::GetContentState and nsNativeTheme::CheckBooleanAttr; (2) UnhookTextRunFromFrames and ClearAllTextRunReferences; (3) nsTextFrame::ClearTextRun; (4) IsPercentageAware; (5) PL_DHashTableFinish; (6) nsListBoxBodyFrame::GetNextItemBox; (7) AtomTableClearEntry, related to the atom table, DOM mutation events, and Unicode surrogates; (8) nsHTMLEditor::HideResizers; and (9) nsWindow::SetCursor, related to changing the cursor; and other vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43a2f83e7d5242bd659a316c0b83c8f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052930" comment="MozillaFirefox-branding-upstream less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032389" comment="MozillaFirefox-translations less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032390" comment="MozillaFirefox less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032391" comment="mozilla-xulrunner190-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052931" comment="mozilla-xulrunner190-devel less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052932" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032392" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052933" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032393" comment="mozilla-xulrunner190-translations less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032395" comment="mozilla-xulrunner190 less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052934" comment="python-xpcom190 less than 1.9.0.11-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055407" comment="seamonkey-dom-inspector less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055408" comment="seamonkey-irc less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055409" comment="seamonkey-mail less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055410" comment="seamonkey-spellchecker less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055411" comment="seamonkey-venkman less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055412" comment="seamonkey less than 1.1.18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053247" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053248" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053249" comment="MozillaThunderbird less than 2.0.0.22-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1438</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1438" source="CVE"/>
	<description>
	Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008.
	</description>
 </metadata>
<!-- a5ca92102b779ff6c30df05f56d23c51 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053149" comment="gstreamer-0_10-plugins-bad-devel less than 0.10.8-6.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053150" comment="gstreamer-0_10-plugins-bad-doc less than 0.10.8-6.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053151" comment="gstreamer-0_10-plugins-bad-lang less than 0.10.8-6.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053152" comment="gstreamer-0_10-plugins-bad less than 0.10.8-6.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053153" comment="libgstapp-0_10-0 less than 0.10.8-6.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1439</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1439" source="CVE"/>
	<description>
	Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
	</description>
 </metadata>
<!-- 422ef4ba0754718912462fb46d07c13f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052726" comment="aufs-kmp-debug less than cvs20081020_2.6.27.23_0.1-1.32.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052727" comment="aufs-kmp-trace less than cvs20081020_2.6.27.23_0.1-1.32.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052728" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.23_0.1-1.7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052729" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.23_0.1-1.7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052730" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.23_0.1-1.49.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052731" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.23_0.1-1.49.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052732" comment="drbd-kmp-debug less than 8.2.7_2.6.27.23_0.1-1.19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052733" comment="drbd-kmp-trace less than 8.2.7_2.6.27.23_0.1-1.19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052734" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.23_0.1-2.40.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052735" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.23_0.1-2.40.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052736" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.23_0.1-89.11.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052737" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.23_0.1-89.11.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052738" comment="kernel-debug-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052739" comment="kernel-debug-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052740" comment="kernel-debug less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032345" comment="kernel-default-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032339" comment="kernel-default-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032346" comment="kernel-default less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052741" comment="kernel-docs less than 2.6.3-3.13.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032347" comment="kernel-kdump less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032356" comment="kernel-pae-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032341" comment="kernel-pae-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032357" comment="kernel-pae less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032348" comment="kernel-ppc64-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032340" comment="kernel-ppc64-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032349" comment="kernel-ppc64 less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052742" comment="kernel-ps3 less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032350" comment="kernel-source less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032351" comment="kernel-syms less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052743" comment="kernel-trace-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052744" comment="kernel-trace-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052745" comment="kernel-trace less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052746" comment="kernel-vanilla less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032360" comment="kernel-xen-base less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032342" comment="kernel-xen-extra less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032361" comment="kernel-xen less than 2.6.27.23-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052747" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.23_0.1-2.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052748" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.23_0.1-2.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052749" comment="kvm-kmp-trace less than 78_2.6.27.23_0.1-6.6.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052750" comment="kvm-kmp-trace less than 78_2.6.27.23_0.1-6.6.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052751" comment="lirc-kmp-trace less than 0.8.4_2.6.27.23_0.1-0.1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052752" comment="ofed-kmp-debug less than 1.4_2.6.27.23_0.1-21.15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052753" comment="ofed-kmp-trace less than 1.4_2.6.27.23_0.1-21.15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052754" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.23_0.1-2.36.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052755" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.23_0.1-2.36.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052756" comment="pcfclock-kmp-debug less than 0.44_2.6.27.23_0.1-227.56.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052757" comment="pcfclock-kmp-trace less than 0.44_2.6.27.23_0.1-227.56.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052758" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.23_0.1-2.8.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052759" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.23_0.1-2.8.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052760" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.23_0.1-2.8.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052761" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.23_0.1-2.8.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052762" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.23_0.1-5.50.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052763" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.23_0.1-5.50.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1492</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1492" source="CVE"/>
	<description>
	The getAnnots Doc method in the JavaScript API in Adobe Reader and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that contains an annotation, and has an OpenAction entry with JavaScript code that calls this method with crafted integer arguments.
	</description>
 </metadata>
<!-- 76b96b9394686be822cb258a0faef047 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052937" comment="acroread less than 8.1.5-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1493</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1493" source="CVE"/>
	<description>
	The customDictionaryOpen spell method in the JavaScript API in Adobe Reader 9.1, 8.1.4, 7.1.1, and earlier on Linux and UNIX allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that triggers a call to this method with a long string in the second argument.
	</description>
 </metadata>
<!-- 76b96b9394686be822cb258a0faef047 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052937" comment="acroread less than 8.1.5-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1494</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1494" source="CVE"/>
	<description>
	The process_stat function in Memcached 1.2.8 discloses memory-allocation statistics in response to a stats malloc command, which allows remote attackers to obtain potentially sensitive information by sending this command to the daemon's TCP port.
	</description>
 </metadata>
<!-- d817c4c810a64ac81c63c4303c942f8b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053773" comment="memcached less than 1.2.6-5.7.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1563</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1563" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2009-0689.  Reason: This candidate is a duplicate of CVE-2009-0689.  Certain codebase relationships were not originally clear.  Notes: All CVE users should reference CVE-2009-0689 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
		</criteria>
	</criteria>
	<!-- 9ca8a268825abc5af253fffbb2888dd8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056065" comment="mozilla-nspr-32bit less than 4.8.2-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056079" comment="mozilla-nspr-64bit less than 4.8.2-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056080" comment="mozilla-nspr-devel less than 4.8.2-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056067" comment="mozilla-nspr less than 4.8.2-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1570</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1570" source="CVE"/>
	<description>
	Integer overflow in the ReadImage function in plug-ins/file-bmp/bmp-read.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a BMP file with crafted width and height values that trigger a heap-based buffer overflow.
	</description>
 </metadata>
<!-- fedbf2cd2eeb2032840dccb917eddc26 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059690" comment="gimp-branding-upstream less than 2.6.2-2.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059691" comment="gimp-devel less than 2.6.2-2.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059692" comment="gimp-doc less than 2.6.2-2.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059693" comment="gimp-lang less than 2.6.2-2.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059694" comment="gimp-plugins-python less than 2.6.2-2.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059695" comment="gimp less than 2.6.2-2.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1571</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571" source="CVE"/>
	<description>
	Use-after-free vulnerability in the HTML parser in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to execute arbitrary code via unspecified method calls that attempt to access freed objects in low-memory situations.
	</description>
 </metadata>
<!-- 3fd814ddf2f9d7e6b55ab6b2edaa3afa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058425" comment="MozillaFirefox-branding-upstream less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058426" comment="MozillaFirefox-branding-upstream less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058427" comment="MozillaFirefox-translations less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058428" comment="MozillaFirefox-translations less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058429" comment="MozillaFirefox less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058430" comment="MozillaFirefox less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058358" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058431" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058432" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058359" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058433" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058360" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058434" comment="python-xpcom190 less than 1.9.0.18-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1572</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1572" source="CVE"/>
	<description>
	The BGP daemon (bgpd) in Quagga 0.99.11 and earlier allows remote attackers to cause a denial of service (crash) via an AS path containing ASN elements whose string representation is longer than expected, which triggers an assert error.
	</description>
 </metadata>
<!-- 49e1cf3866b6fbe62620c98d4c7f2588 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052946" comment="quagga-devel less than 0.99.10-17.30.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052947" comment="quagga less than 0.99.10-17.30.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1574</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1574" source="CVE"/>
	<description>
	racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5789fc55c6b3a2d97a1266c6ad652bec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052950" comment="novell-ipsec-tools-devel less than 0.7.1-2.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052951" comment="novell-ipsec-tools less than 0.7.1-2.5.1"/>
		</criteria>
	</criteria>
	<!-- a84ed7e216dfb1c7df1a83a7b2871a07 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052955" comment="ipsec-tools less than 0.7.1-10.49.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1630</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1630" source="CVE"/>
	<description>
	The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.
	</description>
 </metadata>
<!-- 632ab7317ff05e3ac65e3c809b3cc815 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053548" comment="aufs-kmp-debug less than cvs20081020_2.6.27.25_0.1-1.32.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053549" comment="aufs-kmp-trace less than cvs20081020_2.6.27.25_0.1-1.32.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053550" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.25_0.1-1.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053551" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.25_0.1-1.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053552" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.25_0.1-1.49.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053553" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.25_0.1-1.49.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053554" comment="drbd-kmp-debug less than 8.2.7_2.6.27.25_0.1-1.19.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053555" comment="drbd-kmp-trace less than 8.2.7_2.6.27.25_0.1-1.19.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053556" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.25_0.1-2.40.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053557" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.25_0.1-2.40.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053558" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.25_0.1-89.11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053559" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.25_0.1-89.11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053560" comment="kernel-debug-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053561" comment="kernel-debug-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053562" comment="kernel-debug less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053523" comment="kernel-default-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053546" comment="kernel-default-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053524" comment="kernel-default less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053563" comment="kernel-docs less than 2.6.3-3.13.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053531" comment="kernel-kdump less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053536" comment="kernel-pae-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053564" comment="kernel-pae-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053537" comment="kernel-pae less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053532" comment="kernel-ppc64-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053565" comment="kernel-ppc64-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053533" comment="kernel-ppc64 less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053566" comment="kernel-ps3 less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053525" comment="kernel-source less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053526" comment="kernel-syms less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053567" comment="kernel-trace-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053568" comment="kernel-trace-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053569" comment="kernel-trace less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053570" comment="kernel-vanilla less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053527" comment="kernel-xen-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053547" comment="kernel-xen-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053528" comment="kernel-xen less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053571" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.25_0.1-2.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053572" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.25_0.1-2.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053573" comment="kvm-kmp-trace less than 78_2.6.27.25_0.1-6.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053574" comment="lirc-kmp-trace less than 0.8.4_2.6.27.25_0.1-0.1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053575" comment="ofed-kmp-debug less than 1.4_2.6.27.25_0.1-21.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053576" comment="ofed-kmp-trace less than 1.4_2.6.27.25_0.1-21.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053577" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.25_0.1-2.36.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053578" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.25_0.1-2.36.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053579" comment="pcfclock-kmp-debug less than 0.44_2.6.27.25_0.1-227.56.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053580" comment="pcfclock-kmp-trace less than 0.44_2.6.27.25_0.1-227.56.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053581" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.25_0.1-2.8.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053582" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.25_0.1-2.8.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053583" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.25_0.1-5.50.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053584" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.25_0.1-5.50.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1632</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1632" source="CVE"/>
	<description>
	Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x509sign function in src/racoon/crypto_openssl.c; and (2) the NAT-Traversal (aka NAT-T) keepalive implementation, related to src/racoon/nattraversal.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5789fc55c6b3a2d97a1266c6ad652bec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052950" comment="novell-ipsec-tools-devel less than 0.7.1-2.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052951" comment="novell-ipsec-tools less than 0.7.1-2.5.1"/>
		</criteria>
	</criteria>
	<!-- a84ed7e216dfb1c7df1a83a7b2871a07 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052955" comment="ipsec-tools less than 0.7.1-10.49.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1687</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1687" source="CVE"/>
	<description>
	The JavaScript garbage collector in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle allocation failures, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document that triggers write access to an "offset of a NULL pointer."
	</description>
 </metadata>
<!-- 55cf4960b45b67e8ac429408809af746 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064902" comment="kdelibs3-32bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064903" comment="kdelibs3-64bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064904" comment="kdelibs3-arts-32bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064905" comment="kdelibs3-arts-64bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064906" comment="kdelibs3-arts less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064907" comment="kdelibs3-default-style-32bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064908" comment="kdelibs3-default-style-64bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064909" comment="kdelibs3-default-style less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064910" comment="kdelibs3-devel less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064911" comment="kdelibs3-doc less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064912" comment="kdelibs3 less than 3.5.10-21.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1690</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1690" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by setting an unspecified property of an HTML tag that causes child elements to be freed and later accessed when an HTML error occurs, related to "recursion in certain DOM event handlers."
	</description>
 </metadata>
<!-- 55cf4960b45b67e8ac429408809af746 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064902" comment="kdelibs3-32bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064903" comment="kdelibs3-64bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064904" comment="kdelibs3-arts-32bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064905" comment="kdelibs3-arts-64bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064906" comment="kdelibs3-arts less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064907" comment="kdelibs3-default-style-32bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064908" comment="kdelibs3-default-style-64bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064909" comment="kdelibs3-default-style less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064910" comment="kdelibs3-devel less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064911" comment="kdelibs3-doc less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064912" comment="kdelibs3 less than 3.5.10-21.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1698</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1698" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
	</description>
 </metadata>
<!-- 55cf4960b45b67e8ac429408809af746 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064902" comment="kdelibs3-32bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064903" comment="kdelibs3-64bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064904" comment="kdelibs3-arts-32bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064905" comment="kdelibs3-arts-64bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064906" comment="kdelibs3-arts less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064907" comment="kdelibs3-default-style-32bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064908" comment="kdelibs3-default-style-64bit less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064909" comment="kdelibs3-default-style less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064910" comment="kdelibs3-devel less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064911" comment="kdelibs3-doc less than 3.5.10-21.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064912" comment="kdelibs3 less than 3.5.10-21.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1709</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1709" source="CVE"/>
	<description>
	Use-after-free vulnerability in the garbage-collection implementation in WebCore in WebKit in Apple Safari before 4.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption and application crash) via an SVG animation element, related to SVG set objects, SVG marker elements, the targetElement attribute, and unspecified "caches."
	</description>
 </metadata>
<!-- 70dcc940129b8bbc947920fe8a861207 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064891" comment="kdegraphics3-3D less than 3.5.10-1.66.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064892" comment="kdegraphics3-devel less than 3.5.10-1.66.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064893" comment="kdegraphics3-extra less than 3.5.10-1.66.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064894" comment="kdegraphics3-fax less than 3.5.10-1.66.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064895" comment="kdegraphics3-imaging less than 3.5.10-1.66.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064896" comment="kdegraphics3-kamera less than 3.5.10-1.66.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064897" comment="kdegraphics3-pdf less than 3.5.10-1.66.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064898" comment="kdegraphics3-postscript less than 3.5.10-1.66.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064899" comment="kdegraphics3-scan less than 3.5.10-1.66.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064900" comment="kdegraphics3-tex less than 3.5.10-1.66.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064901" comment="kdegraphics3 less than 3.5.10-1.66.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1720</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1720" source="CVE"/>
	<description>
	Multiple integer overflows in OpenEXR 1.2.2 and 1.6.1 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors that trigger heap-based buffer overflows, related to (1) the Imf::PreviewImage::PreviewImage function and (2) compressor constructors.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 35b048fa90c255ea27fbdf0d85ea0f36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054511" comment="OpenEXR-32bit less than 1.6.1-83.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054512" comment="OpenEXR-64bit less than 1.6.1-83.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054513" comment="OpenEXR-devel less than 1.6.1-83.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054514" comment="OpenEXR-doc less than 1.6.1-83.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054515" comment="OpenEXR less than 1.6.1-83.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1721</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1721" source="CVE"/>
	<description>
	The decompression implementation in the Imf::hufUncompress function in OpenEXR 1.2.2 and 1.6.1 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a free of an uninitialized pointer.
	</description>
 </metadata>
<!-- 35b048fa90c255ea27fbdf0d85ea0f36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054511" comment="OpenEXR-32bit less than 1.6.1-83.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054512" comment="OpenEXR-64bit less than 1.6.1-83.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054513" comment="OpenEXR-devel less than 1.6.1-83.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054514" comment="OpenEXR-doc less than 1.6.1-83.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054515" comment="OpenEXR less than 1.6.1-83.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1725</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1725" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.1.1 for iPod touch, and other platforms; KHTML in kdelibs in KDE; QtWebKit (aka Qt toolkit); and possibly other products do not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
	</description>
 </metadata>
<!-- 12e1fa74cc52c7694f64aacf609176a1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064913" comment="kdelibs4-core less than 4.1.3-4.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064914" comment="kdelibs4-doc less than 4.1.3-4.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064915" comment="kdelibs4 less than 4.1.3-4.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064916" comment="libkde4-32bit less than 4.1.3-4.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064917" comment="libkde4-devel less than 4.1.3-4.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064918" comment="libkde4 less than 4.1.3-4.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064919" comment="libkdecore4-32bit less than 4.1.3-4.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064920" comment="libkdecore4-devel less than 4.1.3-4.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064921" comment="libkdecore4 less than 4.1.3-4.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1788</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1788" source="CVE"/>
	<description>
	Heap-based buffer overflow in voc_read_header in libsndfile 1.0.15 through 1.0.19, as used in Winamp 5.552 and possibly other media programs, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a VOC file with an invalid header value.
	</description>
 </metadata>
<!-- f7e6fe6715fa75f03d61051b49d8f61c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053515" comment="libsndfile-32bit less than 1.0.17-171.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053516" comment="libsndfile-64bit less than 1.0.17-171.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053517" comment="libsndfile-devel less than 1.0.17-171.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053518" comment="libsndfile-octave less than 1.0.17-171.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053519" comment="libsndfile-progs less than 1.0.17-171.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053520" comment="libsndfile less than 1.0.17-171.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1791</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1791" source="CVE"/>
	<description>
	Heap-based buffer overflow in aiff_read_header in libsndfile 1.0.15 through 1.0.19, as used in Winamp 5.552 and possibly other media programs, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an AIFF file with an invalid header value.
	</description>
 </metadata>
<!-- f7e6fe6715fa75f03d61051b49d8f61c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053515" comment="libsndfile-32bit less than 1.0.17-171.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053516" comment="libsndfile-64bit less than 1.0.17-171.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053517" comment="libsndfile-devel less than 1.0.17-171.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053518" comment="libsndfile-octave less than 1.0.17-171.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053519" comment="libsndfile-progs less than 1.0.17-171.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053520" comment="libsndfile less than 1.0.17-171.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1829</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1829" source="CVE"/>
	<description>
	Unspecified vulnerability in the PCNFSD dissector in Wireshark 0.8.20 through 1.0.7 allows remote attackers to cause a denial of service (crash) via crafted PCNFSD packets.
	</description>
 </metadata>
<!-- ef3e619e4955be6ea79c741d39c2e0c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052785" comment="wireshark-devel less than 1.0.4-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052786" comment="wireshark less than 1.0.4-2.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1832</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1832" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors involving "double frame construction."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43a2f83e7d5242bd659a316c0b83c8f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052930" comment="MozillaFirefox-branding-upstream less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032389" comment="MozillaFirefox-translations less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032390" comment="MozillaFirefox less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032391" comment="mozilla-xulrunner190-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052931" comment="mozilla-xulrunner190-devel less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052932" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032392" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052933" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032393" comment="mozilla-xulrunner190-translations less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032395" comment="mozilla-xulrunner190 less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052934" comment="python-xpcom190 less than 1.9.0.11-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055407" comment="seamonkey-dom-inspector less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055408" comment="seamonkey-irc less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055409" comment="seamonkey-mail less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055410" comment="seamonkey-spellchecker less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055411" comment="seamonkey-venkman less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055412" comment="seamonkey less than 1.1.18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053247" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053248" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053249" comment="MozillaThunderbird less than 2.0.0.22-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1833</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1833" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) js_LeaveSharpObject, (2) ParseXMLSource, and (3) a certain assertion in jsinterp.c; and other vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43a2f83e7d5242bd659a316c0b83c8f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052930" comment="MozillaFirefox-branding-upstream less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032389" comment="MozillaFirefox-translations less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032390" comment="MozillaFirefox less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032391" comment="mozilla-xulrunner190-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052931" comment="mozilla-xulrunner190-devel less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052932" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032392" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052933" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032393" comment="mozilla-xulrunner190-translations less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032395" comment="mozilla-xulrunner190 less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052934" comment="python-xpcom190 less than 1.9.0.11-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055407" comment="seamonkey-dom-inspector less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055408" comment="seamonkey-irc less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055409" comment="seamonkey-mail less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055410" comment="seamonkey-spellchecker less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055411" comment="seamonkey-venkman less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055412" comment="seamonkey less than 1.1.18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053247" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053248" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053249" comment="MozillaThunderbird less than 2.0.0.22-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1834</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1834" source="CVE"/>
	<description>
	Visual truncation vulnerability in netwerk/dns/src/nsIDNService.cpp in Mozilla Firefox before 3.0.11 and SeaMonkey before 1.1.17 allows remote attackers to spoof the location bar via an IDN with invalid Unicode characters that are displayed as whitespace, as demonstrated by the \u115A through \u115E characters.
	</description>
 </metadata>
<!-- 43a2f83e7d5242bd659a316c0b83c8f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052930" comment="MozillaFirefox-branding-upstream less than 3.0.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032389" comment="MozillaFirefox-translations less than 3.0.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032390" comment="MozillaFirefox less than 3.0.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032391" comment="mozilla-xulrunner190-32bit less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052931" comment="mozilla-xulrunner190-devel less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052932" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032392" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052933" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032393" comment="mozilla-xulrunner190-translations less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032395" comment="mozilla-xulrunner190 less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052934" comment="python-xpcom190 less than 1.9.0.11-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1835</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1835" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.11 and SeaMonkey before 1.1.17 associate local documents with external domain names located after the file:// substring in a URL, which allows user-assisted remote attackers to read arbitrary cookies via a crafted HTML document, as demonstrated by a URL with file://example.com/C:/ at the beginning.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43a2f83e7d5242bd659a316c0b83c8f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052930" comment="MozillaFirefox-branding-upstream less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032389" comment="MozillaFirefox-translations less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032390" comment="MozillaFirefox less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032391" comment="mozilla-xulrunner190-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052931" comment="mozilla-xulrunner190-devel less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052932" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032392" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052933" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032393" comment="mozilla-xulrunner190-translations less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032395" comment="mozilla-xulrunner190 less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052934" comment="python-xpcom190 less than 1.9.0.11-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055407" comment="seamonkey-dom-inspector less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055408" comment="seamonkey-irc less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055409" comment="seamonkey-mail less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055410" comment="seamonkey-spellchecker less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055411" comment="seamonkey-venkman less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055412" comment="seamonkey less than 1.1.18-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1836</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1836" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43a2f83e7d5242bd659a316c0b83c8f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052930" comment="MozillaFirefox-branding-upstream less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032389" comment="MozillaFirefox-translations less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032390" comment="MozillaFirefox less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032391" comment="mozilla-xulrunner190-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052931" comment="mozilla-xulrunner190-devel less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052932" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032392" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052933" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032393" comment="mozilla-xulrunner190-translations less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032395" comment="mozilla-xulrunner190 less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052934" comment="python-xpcom190 less than 1.9.0.11-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055407" comment="seamonkey-dom-inspector less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055408" comment="seamonkey-irc less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055409" comment="seamonkey-mail less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055410" comment="seamonkey-spellchecker less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055411" comment="seamonkey-venkman less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055412" comment="seamonkey less than 1.1.18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053247" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053248" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053249" comment="MozillaThunderbird less than 2.0.0.22-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1837</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1837" source="CVE"/>
	<description>
	Race condition in the NPObjWrapper_NewResolve function in modules/plugin/base/src/nsJSNPRuntime.cpp in xul.dll in Mozilla Firefox 3 before 3.0.11 might allow remote attackers to execute arbitrary code via a page transition during Java applet loading, related to a use-after-free vulnerability for memory associated with a destroyed Java object.
	</description>
 </metadata>
<!-- 43a2f83e7d5242bd659a316c0b83c8f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052930" comment="MozillaFirefox-branding-upstream less than 3.0.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032389" comment="MozillaFirefox-translations less than 3.0.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032390" comment="MozillaFirefox less than 3.0.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032391" comment="mozilla-xulrunner190-32bit less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052931" comment="mozilla-xulrunner190-devel less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052932" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032392" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052933" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032393" comment="mozilla-xulrunner190-translations less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032395" comment="mozilla-xulrunner190 less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052934" comment="python-xpcom190 less than 1.9.0.11-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1838</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1838" source="CVE"/>
	<description>
	The garbage-collection implementation in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 sets an element's owner document to null in unspecified circumstances, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via a crafted event handler, related to an incorrect context for this event handler.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43a2f83e7d5242bd659a316c0b83c8f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052930" comment="MozillaFirefox-branding-upstream less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032389" comment="MozillaFirefox-translations less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032390" comment="MozillaFirefox less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032391" comment="mozilla-xulrunner190-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052931" comment="mozilla-xulrunner190-devel less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052932" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032392" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052933" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032393" comment="mozilla-xulrunner190-translations less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032395" comment="mozilla-xulrunner190 less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052934" comment="python-xpcom190 less than 1.9.0.11-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055407" comment="seamonkey-dom-inspector less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055408" comment="seamonkey-irc less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055409" comment="seamonkey-mail less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055410" comment="seamonkey-spellchecker less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055411" comment="seamonkey-venkman less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055412" comment="seamonkey less than 1.1.18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053247" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053248" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053249" comment="MozillaThunderbird less than 2.0.0.22-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1839</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1839" source="CVE"/>
	<description>
	Mozilla Firefox 3 before 3.0.11 associates an incorrect principal with a file: URL loaded through the location bar, which allows user-assisted remote attackers to bypass intended access restrictions and read files via a crafted HTML document, aka a "file-URL-to-file-URL scripting" attack.
	</description>
 </metadata>
<!-- 43a2f83e7d5242bd659a316c0b83c8f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052930" comment="MozillaFirefox-branding-upstream less than 3.0.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032389" comment="MozillaFirefox-translations less than 3.0.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032390" comment="MozillaFirefox less than 3.0.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032391" comment="mozilla-xulrunner190-32bit less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052931" comment="mozilla-xulrunner190-devel less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052932" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032392" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052933" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032393" comment="mozilla-xulrunner190-translations less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032395" comment="mozilla-xulrunner190 less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052934" comment="python-xpcom190 less than 1.9.0.11-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1840</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1840" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.11, Thunderbird, and SeaMonkey do not check content policy before loading a script file into a XUL document, which allows remote attackers to bypass intended access restrictions via a crafted HTML document, as demonstrated by a "web bug" in an e-mail message, or web script or an advertisement in a web page.
	</description>
 </metadata>
<!-- 43a2f83e7d5242bd659a316c0b83c8f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052930" comment="MozillaFirefox-branding-upstream less than 3.0.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032389" comment="MozillaFirefox-translations less than 3.0.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032390" comment="MozillaFirefox less than 3.0.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032391" comment="mozilla-xulrunner190-32bit less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052931" comment="mozilla-xulrunner190-devel less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052932" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032392" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052933" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032393" comment="mozilla-xulrunner190-translations less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032395" comment="mozilla-xulrunner190 less than 1.9.0.11-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052934" comment="python-xpcom190 less than 1.9.0.11-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1841</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1841" source="CVE"/>
	<description>
	js/src/xpconnect/src/xpcwrappedjsclass.cpp in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to execute arbitrary web script with the privileges of a chrome object, as demonstrated by the browser sidebar and the FeedWriter.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43a2f83e7d5242bd659a316c0b83c8f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052930" comment="MozillaFirefox-branding-upstream less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032389" comment="MozillaFirefox-translations less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032390" comment="MozillaFirefox less than 3.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032391" comment="mozilla-xulrunner190-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052931" comment="mozilla-xulrunner190-devel less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052932" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032392" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052933" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032393" comment="mozilla-xulrunner190-translations less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032395" comment="mozilla-xulrunner190 less than 1.9.0.11-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052934" comment="python-xpcom190 less than 1.9.0.11-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055407" comment="seamonkey-dom-inspector less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055408" comment="seamonkey-irc less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055409" comment="seamonkey-mail less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055410" comment="seamonkey-spellchecker less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055411" comment="seamonkey-venkman less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055412" comment="seamonkey less than 1.1.18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053247" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053248" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053249" comment="MozillaThunderbird less than 2.0.0.22-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1855</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1855" source="CVE"/>
	<description>
	Stack-based buffer overflow in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow attackers to execute arbitrary code via a PDF file containing a malformed U3D model file with a crafted extension block.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051914" comment="acroread less than 8.1.6-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1856</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1856" source="CVE"/>
	<description>
	Integer overflow in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 allows attackers to cause a denial of service or possibly execute arbitrary code via a PDF file containing unspecified parameters to the FlateDecode filter, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051914" comment="acroread less than 8.1.6-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1857</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1857" source="CVE"/>
	<description>
	Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a PDF document with a crafted TrueType font.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051914" comment="acroread less than 8.1.6-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1858</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1858" source="CVE"/>
	<description>
	The JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051914" comment="acroread less than 8.1.6-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1859</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1859" source="CVE"/>
	<description>
	Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051914" comment="acroread less than 8.1.6-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1861</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1861" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF file with a JPX (aka JPEG2000) stream that triggers heap memory corruption.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051914" comment="acroread less than 8.1.6-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1862</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1862" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009.
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053711" comment="flash-player less than 10.0.32.18-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1863</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1863" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors, related to a "privilege escalation vulnerability."
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053711" comment="flash-player less than 10.0.32.18-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1864</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1864" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053711" comment="flash-player less than 10.0.32.18-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1865</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1865" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, related to a "null pointer vulnerability."
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053711" comment="flash-player less than 10.0.32.18-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1866</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1866" source="CVE"/>
	<description>
	Stack-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053711" comment="flash-player less than 10.0.32.18-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1867</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1867" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to trick a user into (1) selecting a link or (2) completing a dialog, related to a "clickjacking vulnerability."
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053711" comment="flash-player less than 10.0.32.18-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1868</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1868" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors involving URL parsing.
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053711" comment="flash-player less than 10.0.32.18-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1869</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1869" source="CVE"/>
	<description>
	Integer overflow in the ActionScript Virtual Machine 2 (AVM2) abcFile parser in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an AVM2 file with a large intrf_count value that triggers a dereference of an out-of-bounds pointer.
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053711" comment="flash-player less than 10.0.32.18-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1870</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1870" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to obtain sensitive information via vectors involving saving an SWF file to a hard drive, related to a "local sandbox vulnerability."
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053711" comment="flash-player less than 10.0.32.18-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1882</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1882" source="CVE"/>
	<description>
	Integer overflow in the XMakeImage function in magick/xwindow.c in ImageMagick 6.5.2-8, and GraphicsMagick, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF file, which triggers a buffer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 333adfbae730f95489647f5c7256dfd1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052969" comment="ImageMagick-devel less than 6.4.3.6-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052970" comment="ImageMagick-extra less than 6.4.3.6-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052971" comment="ImageMagick less than 6.4.3.6-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052972" comment="libMagick++-devel less than 6.4.3.6-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052973" comment="libMagick++1 less than 6.4.3.6-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052974" comment="libMagickCore1-32bit less than 6.4.3.6-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052975" comment="libMagickCore1-64bit less than 6.4.3.6-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052976" comment="libMagickCore1 less than 6.4.3.6-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052977" comment="libMagickWand1-32bit less than 6.4.3.6-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052978" comment="libMagickWand1-64bit less than 6.4.3.6-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052979" comment="libMagickWand1 less than 6.4.3.6-5.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052980" comment="perl-PerlMagick less than 6.4.3.6-5.4.1"/>
		</criteria>
	</criteria>
	<!-- 3fad66d7b016dccb95e514b0780d56c6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052988" comment="GraphicsMagick-devel less than 1.2.5-4.25.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052989" comment="GraphicsMagick less than 1.2.5-4.25.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052990" comment="libGraphicsMagick++-devel less than 1.2.5-4.25.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052991" comment="libGraphicsMagick++2 less than 1.2.5-4.25.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052992" comment="libGraphicsMagick2 less than 1.2.5-4.25.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052993" comment="libGraphicsMagickWand1 less than 1.2.5-4.25.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052994" comment="perl-GraphicsMagick less than 1.2.5-4.25.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1885</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1885" source="CVE"/>
	<description>
	Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
<!-- b189c841c2708c538b283e8120b72e4c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054075" comment="Xerces-c less than 2.8.0-29.38.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054076" comment="libXerces-c-devel less than 2.8.0-29.38.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054077" comment="libXerces-c28 less than 2.8.0-29.38.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1886</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in client/client.c in smbclient in Samba 3.2.0 through 3.2.12 might allow context-dependent attackers to execute arbitrary code via format string specifiers in a filename.
	</description>
 </metadata>
<!-- a5a1416fb2b76a9b9e24ae4fe3a70e35 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053293" comment="cifs-mount less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053294" comment="ldapsmb less than 1.34b-6.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053295" comment="libnetapi-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053296" comment="libnetapi0 less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053297" comment="libsmbclient-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053298" comment="libsmbclient0-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053299" comment="libsmbclient0-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053300" comment="libsmbclient0 less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053301" comment="libsmbsharemodes-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053302" comment="libsmbsharemodes0 less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053303" comment="libtalloc-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053304" comment="libtalloc1-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053305" comment="libtalloc1-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053306" comment="libtalloc1 less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053307" comment="libtdb-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053308" comment="libtdb1-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053309" comment="libtdb1-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053310" comment="libtdb1 less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053311" comment="libwbclient-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053312" comment="libwbclient0-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053313" comment="libwbclient0-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053314" comment="libwbclient0 less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053315" comment="samba-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053316" comment="samba-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053317" comment="samba-client-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053318" comment="samba-client-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053319" comment="samba-client less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053320" comment="samba-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053321" comment="samba-krb-printing less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053322" comment="samba-vscan less than 0.3.6b-6.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053323" comment="samba-winbind-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053324" comment="samba-winbind-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053325" comment="samba-winbind less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053326" comment="samba less than 3.2.7-11.3.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1888</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888" source="CVE"/>
	<description>
	The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory.
	</description>
 </metadata>
<!-- a5a1416fb2b76a9b9e24ae4fe3a70e35 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053293" comment="cifs-mount less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053294" comment="ldapsmb less than 1.34b-6.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053295" comment="libnetapi-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053296" comment="libnetapi0 less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053297" comment="libsmbclient-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053298" comment="libsmbclient0-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053299" comment="libsmbclient0-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053300" comment="libsmbclient0 less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053301" comment="libsmbsharemodes-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053302" comment="libsmbsharemodes0 less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053303" comment="libtalloc-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053304" comment="libtalloc1-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053305" comment="libtalloc1-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053306" comment="libtalloc1 less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053307" comment="libtdb-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053308" comment="libtdb1-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053309" comment="libtdb1-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053310" comment="libtdb1 less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053311" comment="libwbclient-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053312" comment="libwbclient0-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053313" comment="libwbclient0-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053314" comment="libwbclient0 less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053315" comment="samba-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053316" comment="samba-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053317" comment="samba-client-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053318" comment="samba-client-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053319" comment="samba-client less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053320" comment="samba-devel less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053321" comment="samba-krb-printing less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053322" comment="samba-vscan less than 0.3.6b-6.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053323" comment="samba-winbind-32bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053324" comment="samba-winbind-64bit less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053325" comment="samba-winbind less than 3.2.7-11.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053326" comment="samba less than 3.2.7-11.3.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1889</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889" source="CVE"/>
	<description>
	The OSCAR protocol implementation in Pidgin before 2.5.8 misinterprets the ICQWebMessage message type as the ICQSMS message type, which allows remote attackers to cause a denial of service (application crash) via a crafted ICQ web message that triggers allocation of a large amount of memory.
	</description>
 </metadata>
<!-- c6e96ee2134421d222e8156b30505732 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053491" comment="finch-devel less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053492" comment="finch less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053493" comment="libpurple-devel less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053494" comment="libpurple-lang less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053495" comment="libpurple-meanwhile less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053496" comment="libpurple-mono less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053497" comment="libpurple less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053498" comment="pidgin-devel less than 2.5.1-3.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053499" comment="pidgin less than 2.5.1-3.12.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1890</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890" source="CVE"/>
	<description>
	The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
	</description>
 </metadata>
<!-- 0683ec2df667efa4b179f003d0da49d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055738" comment="apache2-devel less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055739" comment="apache2-doc less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055740" comment="apache2-example-pages less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055741" comment="apache2-prefork less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055742" comment="apache2-utils less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055743" comment="apache2-worker less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055744" comment="apache2 less than 2.2.10-2.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1891</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891" source="CVE"/>
	<description>
	The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
	</description>
 </metadata>
<!-- 0683ec2df667efa4b179f003d0da49d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055738" comment="apache2-devel less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055739" comment="apache2-doc less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055740" comment="apache2-example-pages less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055741" comment="apache2-prefork less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055742" comment="apache2-utils less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055743" comment="apache2-worker less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055744" comment="apache2 less than 2.2.10-2.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1895</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1895" source="CVE"/>
	<description>
	The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
	</description>
 </metadata>
<!-- 9ea1d108afb7e0239650848c8d9cd8fc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054196" comment="aufs-kmp-debug less than cvs20081020_2.6.27.29_0.1-1.32.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054197" comment="aufs-kmp-trace less than cvs20081020_2.6.27.29_0.1-1.32.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054198" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.29_0.1-1.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054199" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.29_0.1-1.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054200" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.29_0.1-1.49.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054201" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.29_0.1-1.49.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054202" comment="drbd-kmp-debug less than 8.2.7_2.6.27.29_0.1-1.19.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054203" comment="drbd-kmp-trace less than 8.2.7_2.6.27.29_0.1-1.19.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054204" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.29_0.1-2.40.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054205" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.29_0.1-2.40.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054206" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.29_0.1-89.11.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054207" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.29_0.1-89.11.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054208" comment="kernel-debug-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054209" comment="kernel-debug-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054210" comment="kernel-debug less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054108" comment="kernel-default-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054182" comment="kernel-default-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054109" comment="kernel-default less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054211" comment="kernel-docs less than 2.6.3-3.13.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054180" comment="kernel-ec2-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054212" comment="kernel-ec2-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054181" comment="kernel-ec2 less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054119" comment="kernel-kdump less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054110" comment="kernel-pae-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054183" comment="kernel-pae-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054111" comment="kernel-pae less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054120" comment="kernel-ppc64-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054213" comment="kernel-ppc64-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054121" comment="kernel-ppc64 less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054214" comment="kernel-ps3 less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054112" comment="kernel-source less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054113" comment="kernel-syms less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054215" comment="kernel-trace-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054216" comment="kernel-trace-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054217" comment="kernel-trace less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054218" comment="kernel-vanilla less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054116" comment="kernel-xen-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054184" comment="kernel-xen-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054117" comment="kernel-xen less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054219" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.29_0.1-2.1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054220" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.29_0.1-2.1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054221" comment="kvm-kmp-trace less than 78_2.6.27.29_0.1-6.7.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054222" comment="lirc-kmp-trace less than 0.8.4_2.6.27.29_0.1-0.1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054223" comment="ofed-kmp-debug less than 1.4_2.6.27.29_0.1-21.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054224" comment="ofed-kmp-trace less than 1.4_2.6.27.29_0.1-21.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054225" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.29_0.1-2.36.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054226" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.29_0.1-2.36.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054227" comment="pcfclock-kmp-debug less than 0.44_2.6.27.29_0.1-227.56.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054228" comment="pcfclock-kmp-trace less than 0.44_2.6.27.29_0.1-227.56.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054229" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.29_0.1-2.8.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054230" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.29_0.1-2.8.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054231" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.29_0.1-5.50.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054232" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.29_0.1-5.50.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1896</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1896" source="CVE"/>
	<description>
	The Java Web Start framework in IcedTea in OpenJDK before 1.6.0.0-20.b16.fc10 on Fedora 10, and before 1.6.0.0-27.b16.fc11 on Fedora 11, trusts an entire application when at least one of the listed jar files is trusted, which allows context-dependent attackers to execute arbitrary code without the untrusted-code restrictions via a crafted application, related to NetX.
	</description>
 </metadata>
<!-- ba41b676c39b719fa82afb950dfb8541 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054457" comment="java-1_6_0-openjdk-demo less than 1.5.1_b16-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054458" comment="java-1_6_0-openjdk-devel less than 1.5.1_b16-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054459" comment="java-1_6_0-openjdk-javadoc less than 1.5.1_b16-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054460" comment="java-1_6_0-openjdk-plugin less than 1.5.1_b16-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054461" comment="java-1_6_0-openjdk-src less than 1.5.1_b16-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054462" comment="java-1_6_0-openjdk less than 1.5.1_b16-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1902</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1902" source="CVE"/>
	<description>
	The multipart processor in ModSecurity before 2.5.9 allows remote attackers to cause a denial of service (crash) via a multipart form datapost request with a missing part header name, which triggers a NULL pointer dereference.
	</description>
 </metadata>
<!-- 1e915f214cab73b62facf4375d710586 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053010" comment="apache2-mod_security2 less than 2.5.6-1.25.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1904</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1904" source="CVE"/>
	<description>
	The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053202" comment="ruby-devel less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053203" comment="ruby-doc-html less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053204" comment="ruby-doc-ri less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053205" comment="ruby-examples less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053206" comment="ruby-test-suite less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053207" comment="ruby-tk less than 1.8.7.p72-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053208" comment="ruby less than 1.8.7.p72-5.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1932</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932" source="CVE"/>
	<description>
	Multiple integer overflows in the (1) user_info_callback, (2) user_endrow_callback, and (3) gst_pngdec_task functions (ext/libpng/gstpngdec.c) in GStreamer Good Plug-ins (aka gst-plugins-good or gstreamer-plugins-good) 0.10.15 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PNG file, which triggers a buffer overflow.
	</description>
 </metadata>
<!-- ec534b37a14f0e15238d1a252b1e6e0c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053161" comment="gstreamer-0_10-plugins-good-doc less than 0.10.10-3.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053162" comment="gstreamer-0_10-plugins-good-doc less than 0.10.10-3.22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053163" comment="gstreamer-0_10-plugins-good-extra less than 0.10.10-3.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053164" comment="gstreamer-0_10-plugins-good-extra less than 0.10.10-3.22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053165" comment="gstreamer-0_10-plugins-good-lang less than 0.10.10-3.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053166" comment="gstreamer-0_10-plugins-good-lang less than 0.10.10-3.22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053167" comment="gstreamer-0_10-plugins-good less than 0.10.10-3.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053168" comment="gstreamer-0_10-plugins-good less than 0.10.10-3.22.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1955</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955" source="CVE"/>
	<description>
	The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
	</description>
 </metadata>
<!-- 9d2407b0352245ff49a54784986b83a9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053421" comment="libapr-util1-dbd-mysql less than 1.3.4-13.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053422" comment="libapr-util1-dbd-pgsql less than 1.3.4-13.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053423" comment="libapr-util1-dbd-sqlite3 less than 1.3.4-13.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053424" comment="libapr-util1-devel less than 1.3.4-13.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053425" comment="libapr-util1 less than 1.3.4-13.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1956</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956" source="CVE"/>
	<description>
	Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
	</description>
 </metadata>
<!-- 9d2407b0352245ff49a54784986b83a9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053421" comment="libapr-util1-dbd-mysql less than 1.3.4-13.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053422" comment="libapr-util1-dbd-pgsql less than 1.3.4-13.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053423" comment="libapr-util1-dbd-sqlite3 less than 1.3.4-13.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053424" comment="libapr-util1-devel less than 1.3.4-13.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053425" comment="libapr-util1 less than 1.3.4-13.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1957</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1957" source="CVE"/>
	<description>
	charon/sa/ike_sa.c in the charon daemon in strongSWAN before 4.3.1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an invalid IKE_SA_INIT request that triggers "an incomplete state," followed by a CREATE_CHILD_SA request.
	</description>
 </metadata>
<!-- 9adb40871d8f0d22746336fec20d72dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053016" comment="strongswan-doc less than 4.2.8-1.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053017" comment="strongswan less than 4.2.8-1.25.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1958</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1958" source="CVE"/>
	<description>
	charon/sa/tasks/child_create.c in the charon daemon in strongSWAN before 4.3.1 switches the NULL checks for TSi and TSr payloads, which allows remote attackers to cause a denial of service via an IKE_AUTH request without a (1) TSi or (2) TSr traffic selector.
	</description>
 </metadata>
<!-- 9adb40871d8f0d22746336fec20d72dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053016" comment="strongswan-doc less than 4.2.8-1.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053017" comment="strongswan less than 4.2.8-1.25.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1959</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1959" source="CVE"/>
	<description>
	Off-by-one error in the event_wallops function in fe-common/irc/fe-events.c in irssi 0.8.13 allows remote IRC servers to cause a denial of service (crash) via an empty command, which triggers a one-byte buffer under-read and a one-byte buffer underflow.
	</description>
 </metadata>
<!-- f3604ddb60d424b576ba6c072aa717d6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053020" comment="irssi-devel less than 0.8.12-30.70.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053021" comment="irssi less than 0.8.12-30.70.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1961</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1961" source="CVE"/>
	<description>
	The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.
	</description>
 </metadata>
<!-- 632ab7317ff05e3ac65e3c809b3cc815 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053548" comment="aufs-kmp-debug less than cvs20081020_2.6.27.25_0.1-1.32.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053549" comment="aufs-kmp-trace less than cvs20081020_2.6.27.25_0.1-1.32.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053550" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.25_0.1-1.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053551" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.25_0.1-1.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053552" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.25_0.1-1.49.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053553" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.25_0.1-1.49.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053554" comment="drbd-kmp-debug less than 8.2.7_2.6.27.25_0.1-1.19.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053555" comment="drbd-kmp-trace less than 8.2.7_2.6.27.25_0.1-1.19.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053556" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.25_0.1-2.40.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053557" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.25_0.1-2.40.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053558" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.25_0.1-89.11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053559" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.25_0.1-89.11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053560" comment="kernel-debug-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053561" comment="kernel-debug-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053562" comment="kernel-debug less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053523" comment="kernel-default-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053546" comment="kernel-default-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053524" comment="kernel-default less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053563" comment="kernel-docs less than 2.6.3-3.13.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053531" comment="kernel-kdump less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053536" comment="kernel-pae-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053564" comment="kernel-pae-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053537" comment="kernel-pae less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053532" comment="kernel-ppc64-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053565" comment="kernel-ppc64-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053533" comment="kernel-ppc64 less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053566" comment="kernel-ps3 less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053525" comment="kernel-source less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053526" comment="kernel-syms less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053567" comment="kernel-trace-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053568" comment="kernel-trace-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053569" comment="kernel-trace less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053570" comment="kernel-vanilla less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053527" comment="kernel-xen-base less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053547" comment="kernel-xen-extra less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053528" comment="kernel-xen less than 2.6.27.25-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053571" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.25_0.1-2.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053572" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.25_0.1-2.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053573" comment="kvm-kmp-trace less than 78_2.6.27.25_0.1-6.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053574" comment="lirc-kmp-trace less than 0.8.4_2.6.27.25_0.1-0.1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053575" comment="ofed-kmp-debug less than 1.4_2.6.27.25_0.1-21.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053576" comment="ofed-kmp-trace less than 1.4_2.6.27.25_0.1-21.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053577" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.25_0.1-2.36.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053578" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.25_0.1-2.36.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053579" comment="pcfclock-kmp-debug less than 0.44_2.6.27.25_0.1-227.56.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053580" comment="pcfclock-kmp-trace less than 0.44_2.6.27.25_0.1-227.56.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053581" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.25_0.1-2.8.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053582" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.25_0.1-2.8.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053583" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.25_0.1-5.50.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053584" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.25_0.1-5.50.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2028</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2028" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 have unknown impact and attack vectors, related to "Adobe internally discovered issues."
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051914" comment="acroread less than 8.1.6-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2042</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2042" source="CVE"/>
	<description>
	libpng before 1.2.37 does not properly parse 1-bit interlaced images with width values that are not divisible by 8, which causes libpng to include uninitialized bits in certain rows of a PNG file and might allow remote attackers to read portions of sensitive memory via "out-of-bounds pixels" in the file.
	</description>
 </metadata>
<!-- cd34d06447ca87925900fcda764653fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053384" comment="libpng-devel-32bit less than 1.2.31-4.38.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053385" comment="libpng-devel-64bit less than 1.2.31-4.38.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053386" comment="libpng-devel less than 1.2.31-4.38.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053387" comment="libpng12-0-32bit less than 1.2.31-4.38.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053388" comment="libpng12-0-64bit less than 1.2.31-4.38.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053389" comment="libpng12-0 less than 1.2.31-4.38.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053390" comment="libpng3 less than 1.2.31-4.38.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2059</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2059" source="CVE"/>
	<description>
	Opera, possibly before 9.25, uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
	</description>
 </metadata>
<!-- a897914e6fa37f606b823ac101036941 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054537" comment="opera less than 10.00-6.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2063</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2063" source="CVE"/>
	<description>
	Opera, possibly before 9.25, processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.
	</description>
 </metadata>
<!-- a897914e6fa37f606b823ac101036941 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054537" comment="opera less than 10.00-6.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2067</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2067" source="CVE"/>
	<description>
	Opera detects http content in https web pages only when the top-level frame uses https, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying an http page to include an https iframe that references a script file on an http site, related to "HTTP-Intended-but-HTTPS-Loadable (HPIHSL) pages."
	</description>
 </metadata>
<!-- a897914e6fa37f606b823ac101036941 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054537" comment="opera less than 10.00-6.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2070</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2070" source="CVE"/>
	<description>
	Opera displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT response page returned by a proxy server, which allows man-in-the-middle attackers to spoof an arbitrary https site by letting a browser obtain a valid certificate from this site during one request, and then sending the browser a crafted 502 response page upon a subsequent request.
	</description>
 </metadata>
<!-- a897914e6fa37f606b823ac101036941 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054537" comment="opera less than 10.00-6.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2185</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2185" source="CVE"/>
	<description>
	The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2cef7bf609bb0375362b1030b7dc2854 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053451" comment="strongswan-doc less than 4.2.8-1.26.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053452" comment="strongswan less than 4.2.8-1.26.1"/>
		</criteria>
	</criteria>
	<!-- 3eacdd0910e6c07c6cb58e85f0f3db95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053455" comment="openswan-doc less than 2.6.16-1.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053456" comment="openswan less than 2.6.16-1.48.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2210</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2210" source="CVE"/>
	<description>
	Mozilla Thunderbird before 2.0.0.22 and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a multipart/alternative e-mail message containing a text/enhanced part that triggers access to an incorrect object type.
	</description>
 </metadata>
<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055407" comment="seamonkey-dom-inspector less than 1.1.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055408" comment="seamonkey-irc less than 1.1.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055409" comment="seamonkey-mail less than 1.1.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055410" comment="seamonkey-spellchecker less than 1.1.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055411" comment="seamonkey-venkman less than 1.1.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055412" comment="seamonkey less than 1.1.18-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2285</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285" source="CVE"/>
	<description>
	Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.
	</description>
 </metadata>
<!-- 5b4a523091e76df85478773259387569 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053736" comment="libtiff3-32bit less than 3.8.2-133.36.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053737" comment="libtiff3-64bit less than 3.8.2-133.36.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053738" comment="libtiff3 less than 3.8.2-133.36.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2288</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288" source="CVE"/>
	<description>
	statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
	</description>
 </metadata>
<!-- 779ccaf748aa6e39c79b69c4f88607fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053680" comment="nagios-devel less than 3.0.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053681" comment="nagios-www less than 3.0.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053682" comment="nagios less than 3.0.6-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2347</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347" source="CVE"/>
	<description>
	Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.
	</description>
 </metadata>
<!-- 0a5af65bd5d0ed02ca80c38c5e984ec2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054087" comment="libtiff-devel-32bit less than 3.8.2-133.37.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054088" comment="libtiff-devel-64bit less than 3.8.2-133.37.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054089" comment="libtiff-devel less than 3.8.2-133.37.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054090" comment="libtiff3-32bit less than 3.8.2-133.37.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054091" comment="libtiff3-64bit less than 3.8.2-133.37.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054092" comment="libtiff3 less than 3.8.2-133.37.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054093" comment="tiff less than 3.8.2-133.37.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2395</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2395" source="CVE"/>
	<description>
	SQL injection vulnerability in the K2 (com_k2) component 1.0.1 Beta and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the category parameter in an itemlist action to index.php.
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053711" comment="flash-player less than 10.0.32.18-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2404</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2404" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404" source="CVE"/>
	<description>
	Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055407" comment="seamonkey-dom-inspector less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055408" comment="seamonkey-irc less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055409" comment="seamonkey-mail less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055410" comment="seamonkey-spellchecker less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055411" comment="seamonkey-venkman less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055412" comment="seamonkey less than 1.1.18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fa6cee995a02040d4744f1899860b74c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053937" comment="libfreebl3-32bit less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053969" comment="libfreebl3-64bit less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053939" comment="libfreebl3 less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053940" comment="mozilla-nss-32bit less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053970" comment="mozilla-nss-64bit less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053960" comment="mozilla-nss-devel less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053941" comment="mozilla-nss-tools less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053943" comment="mozilla-nss less than 3.12.3.1-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2406</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2406" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2406" source="CVE"/>
	<description>
	Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.
	</description>
 </metadata>
<!-- 9ea1d108afb7e0239650848c8d9cd8fc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054196" comment="aufs-kmp-debug less than cvs20081020_2.6.27.29_0.1-1.32.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054197" comment="aufs-kmp-trace less than cvs20081020_2.6.27.29_0.1-1.32.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054198" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.29_0.1-1.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054199" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.29_0.1-1.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054200" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.29_0.1-1.49.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054201" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.29_0.1-1.49.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054202" comment="drbd-kmp-debug less than 8.2.7_2.6.27.29_0.1-1.19.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054203" comment="drbd-kmp-trace less than 8.2.7_2.6.27.29_0.1-1.19.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054204" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.29_0.1-2.40.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054205" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.29_0.1-2.40.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054206" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.29_0.1-89.11.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054207" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.29_0.1-89.11.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054208" comment="kernel-debug-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054209" comment="kernel-debug-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054210" comment="kernel-debug less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054108" comment="kernel-default-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054182" comment="kernel-default-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054109" comment="kernel-default less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054211" comment="kernel-docs less than 2.6.3-3.13.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054180" comment="kernel-ec2-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054212" comment="kernel-ec2-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054181" comment="kernel-ec2 less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054119" comment="kernel-kdump less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054110" comment="kernel-pae-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054183" comment="kernel-pae-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054111" comment="kernel-pae less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054120" comment="kernel-ppc64-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054213" comment="kernel-ppc64-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054121" comment="kernel-ppc64 less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054214" comment="kernel-ps3 less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054112" comment="kernel-source less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054113" comment="kernel-syms less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054215" comment="kernel-trace-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054216" comment="kernel-trace-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054217" comment="kernel-trace less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054218" comment="kernel-vanilla less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054116" comment="kernel-xen-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054184" comment="kernel-xen-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054117" comment="kernel-xen less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054219" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.29_0.1-2.1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054220" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.29_0.1-2.1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054221" comment="kvm-kmp-trace less than 78_2.6.27.29_0.1-6.7.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054222" comment="lirc-kmp-trace less than 0.8.4_2.6.27.29_0.1-0.1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054223" comment="ofed-kmp-debug less than 1.4_2.6.27.29_0.1-21.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054224" comment="ofed-kmp-trace less than 1.4_2.6.27.29_0.1-21.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054225" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.29_0.1-2.36.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054226" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.29_0.1-2.36.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054227" comment="pcfclock-kmp-debug less than 0.44_2.6.27.29_0.1-227.56.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054228" comment="pcfclock-kmp-trace less than 0.44_2.6.27.29_0.1-227.56.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054229" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.29_0.1-2.8.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054230" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.29_0.1-2.8.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054231" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.29_0.1-5.50.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054232" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.29_0.1-5.50.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2407</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2407" source="CVE"/>
	<description>
	Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.
	</description>
 </metadata>
<!-- 9ea1d108afb7e0239650848c8d9cd8fc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054196" comment="aufs-kmp-debug less than cvs20081020_2.6.27.29_0.1-1.32.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054197" comment="aufs-kmp-trace less than cvs20081020_2.6.27.29_0.1-1.32.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054198" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.29_0.1-1.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054199" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.29_0.1-1.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054200" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.29_0.1-1.49.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054201" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.29_0.1-1.49.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054202" comment="drbd-kmp-debug less than 8.2.7_2.6.27.29_0.1-1.19.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054203" comment="drbd-kmp-trace less than 8.2.7_2.6.27.29_0.1-1.19.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054204" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.29_0.1-2.40.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054205" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.29_0.1-2.40.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054206" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.29_0.1-89.11.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054207" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.29_0.1-89.11.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054208" comment="kernel-debug-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054209" comment="kernel-debug-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054210" comment="kernel-debug less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054108" comment="kernel-default-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054182" comment="kernel-default-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054109" comment="kernel-default less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054211" comment="kernel-docs less than 2.6.3-3.13.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054180" comment="kernel-ec2-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054212" comment="kernel-ec2-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054181" comment="kernel-ec2 less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054119" comment="kernel-kdump less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054110" comment="kernel-pae-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054183" comment="kernel-pae-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054111" comment="kernel-pae less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054120" comment="kernel-ppc64-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054213" comment="kernel-ppc64-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054121" comment="kernel-ppc64 less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054214" comment="kernel-ps3 less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054112" comment="kernel-source less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054113" comment="kernel-syms less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054215" comment="kernel-trace-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054216" comment="kernel-trace-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054217" comment="kernel-trace less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054218" comment="kernel-vanilla less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054116" comment="kernel-xen-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054184" comment="kernel-xen-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054117" comment="kernel-xen less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054219" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.29_0.1-2.1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054220" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.29_0.1-2.1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054221" comment="kvm-kmp-trace less than 78_2.6.27.29_0.1-6.7.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054222" comment="lirc-kmp-trace less than 0.8.4_2.6.27.29_0.1-0.1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054223" comment="ofed-kmp-debug less than 1.4_2.6.27.29_0.1-21.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054224" comment="ofed-kmp-trace less than 1.4_2.6.27.29_0.1-21.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054225" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.29_0.1-2.36.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054226" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.29_0.1-2.36.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054227" comment="pcfclock-kmp-debug less than 0.44_2.6.27.29_0.1-227.56.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054228" comment="pcfclock-kmp-trace less than 0.44_2.6.27.29_0.1-227.56.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054229" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.29_0.1-2.8.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054230" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.29_0.1-2.8.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054231" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.29_0.1-5.50.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054232" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.29_0.1-5.50.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2408</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408" source="CVE"/>
	<description>
	Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d6da5b45c1cb52d53132d6454cd0eee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054944" comment="mutt less than 1.5.17-42.113.2"/>
	</criteria>
	<!-- 61e8a7944bfbd369b915673c77e34371 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055795" comment="libneon-devel less than 0.28.3-1.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055796" comment="libneon27-32bit less than 0.28.3-1.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055797" comment="libneon27-64bit less than 0.28.3-1.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055798" comment="libneon27 less than 0.28.3-1.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055799" comment="neon less than 0.28.3-1.31.1"/>
		</criteria>
	</criteria>
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055407" comment="seamonkey-dom-inspector less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055408" comment="seamonkey-irc less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055409" comment="seamonkey-mail less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055410" comment="seamonkey-spellchecker less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055411" comment="seamonkey-venkman less than 1.1.18-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055412" comment="seamonkey less than 1.1.18-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 75f46c9fd2936d98b45f668341fb8858 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054884" comment="MozillaThunderbird-devel less than 2.0.0.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054885" comment="MozillaThunderbird-translations less than 2.0.0.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054886" comment="MozillaThunderbird less than 2.0.0.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054887" comment="hunspell-32bit less than 1.2.7-1.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054888" comment="hunspell-64bit less than 1.2.7-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054889" comment="hunspell less than 1.2.7-1.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054890" comment="hunspell less than 1.2.7-1.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054891" comment="hunspell less than 1.2.7-1.35"/>
		</criteria>
	</criteria>
	<!-- bc27de2ca066dbc73291508df81e8022 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054957" comment="libldap-2_4-2-32bit less than 2.4.12-5.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054958" comment="libldap-2_4-2-64bit less than 2.4.12-5.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054959" comment="libldap-2_4-2 less than 2.4.12-5.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054960" comment="openldap2-back-meta less than 2.4.12-5.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054961" comment="openldap2-back-perl less than 2.4.12-5.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054962" comment="openldap2-client less than 2.4.12-5.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054963" comment="openldap2-devel-32bit less than 2.4.12-5.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054964" comment="openldap2-devel-64bit less than 2.4.12-5.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054965" comment="openldap2-devel less than 2.4.12-5.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054966" comment="openldap2 less than 2.4.12-5.5.1"/>
		</criteria>
	</criteria>
	<!-- fa6cee995a02040d4744f1899860b74c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053937" comment="libfreebl3-32bit less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053969" comment="libfreebl3-64bit less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053939" comment="libfreebl3 less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053940" comment="mozilla-nss-32bit less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053970" comment="mozilla-nss-64bit less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053960" comment="mozilla-nss-devel less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053941" comment="mozilla-nss-tools less than 3.12.3.1-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053943" comment="mozilla-nss less than 3.12.3.1-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2409</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409" source="CVE"/>
	<description>
	The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time.  NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
	</description>
 </metadata>
<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2411</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2411" source="CVE"/>
	<description>
	Multiple integer overflows in the libsvn_delta library in Subversion before 1.5.7, and 1.6.x before 1.6.4, allow remote authenticated users and remote Subversion servers to execute arbitrary code via an svndiff stream with large windows that trigger a heap-based buffer overflow, a related issue to CVE-2009-2412.
	</description>
 </metadata>
<!-- e076f23d0b0fbb6bdc26ff2547f08843 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053796" comment="subversion-devel less than 1.5.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053797" comment="subversion-perl less than 1.5.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053798" comment="subversion-python less than 1.5.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053799" comment="subversion-server less than 1.5.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053800" comment="subversion-tools less than 1.5.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053801" comment="subversion less than 1.5.7-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2412</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412" source="CVE"/>
	<description>
	Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- e5367e007c9fcb0acf4d2437c235d48e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055572" comment="libapr-util1-dbd-mysql less than 1.3.4-13.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055573" comment="libapr-util1-dbd-pgsql less than 1.3.4-13.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055574" comment="libapr-util1-dbd-sqlite3 less than 1.3.4-13.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055575" comment="libapr-util1-devel less than 1.3.4-13.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055576" comment="libapr-util1 less than 1.3.4-13.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055577" comment="libapr1-devel less than 1.3.3-12.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055578" comment="libapr1 less than 1.3.3-12.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2414</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414" source="CVE"/>
	<description>
	Stack consumption vulnerability in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allows context-dependent attackers to cause a denial of service (application crash) via a large depth of element declarations in a DTD, related to a function recursion, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 52967c863368f15f7e08c1d3d7ffa498 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053809" comment="libxml2-32bit less than 2.7.1-9.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053810" comment="libxml2-64bit less than 2.7.1-9.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053811" comment="libxml2-devel-32bit less than 2.7.1-9.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053812" comment="libxml2-devel-64bit less than 2.7.1-9.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053813" comment="libxml2-devel less than 2.7.1-9.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053814" comment="libxml2-doc less than 2.7.1-9.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053815" comment="libxml2 less than 2.7.1-9.8.1"/>
		</criteria>
	</criteria>
	<!-- e40be77af2d03aeb1e404e9f87be5d58 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054834" comment="libxml-32bit less than 1.8.17-480.52.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054835" comment="libxml-64bit less than 1.8.17-480.52.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054836" comment="libxml-devel less than 1.8.17-480.52.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054837" comment="libxml less than 1.8.17-480.52.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2415</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2415" source="CVE"/>
	<description>
	Multiple integer overflows in memcached 1.1.12 and 1.2.2 allow remote attackers to execute arbitrary code via vectors involving length attributes that trigger heap-based buffer overflows.
	</description>
 </metadata>
<!-- d817c4c810a64ac81c63c4303c942f8b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053773" comment="memcached less than 1.2.6-5.7.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2416</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416" source="CVE"/>
	<description>
	Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 52967c863368f15f7e08c1d3d7ffa498 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053809" comment="libxml2-32bit less than 2.7.1-9.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053810" comment="libxml2-64bit less than 2.7.1-9.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053811" comment="libxml2-devel-32bit less than 2.7.1-9.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053812" comment="libxml2-devel-64bit less than 2.7.1-9.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053813" comment="libxml2-devel less than 2.7.1-9.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053814" comment="libxml2-doc less than 2.7.1-9.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053815" comment="libxml2 less than 2.7.1-9.8.1"/>
		</criteria>
	</criteria>
	<!-- e40be77af2d03aeb1e404e9f87be5d58 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054834" comment="libxml-32bit less than 1.8.17-480.52.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054835" comment="libxml-64bit less than 1.8.17-480.52.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054836" comment="libxml-devel less than 1.8.17-480.52.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054837" comment="libxml less than 1.8.17-480.52.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2417</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417" source="CVE"/>
	<description>
	lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- dc5f5cc020c3d593a243573dc0f44754 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054237" comment="curl less than 7.19.0-11.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054238" comment="libcurl-devel less than 7.19.0-11.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054239" comment="libcurl4-32bit less than 7.19.0-11.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054240" comment="libcurl4-64bit less than 7.19.0-11.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054241" comment="libcurl4 less than 7.19.0-11.3.1"/>
		</criteria>
	</criteria>
	<!-- e45125b9ecda8788f5d94e3c0022985d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053932" comment="curl less than 7.19.0-11.2.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053933" comment="libcurl-devel less than 7.19.0-11.2.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053934" comment="libcurl4-32bit less than 7.19.0-11.2.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053935" comment="libcurl4-64bit less than 7.19.0-11.2.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053936" comment="libcurl4 less than 7.19.0-11.2.16"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2446</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2446" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 00f6af27c9453ea91d6031df5dac835c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054336" comment="libmysqlclient-devel less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054337" comment="libmysqlclient15-32bit less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054338" comment="libmysqlclient15-64bit less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054339" comment="libmysqlclient15 less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054340" comment="libmysqlclient_r15-32bit less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054341" comment="libmysqlclient_r15-64bit less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054342" comment="libmysqlclient_r15 less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054343" comment="mysql-Max less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054344" comment="mysql-bench less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054345" comment="mysql-client less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054346" comment="mysql-debug less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054347" comment="mysql-test less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054348" comment="mysql-tools less than 5.0.67-12.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054349" comment="mysql less than 5.0.67-12.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2462</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2462" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) the frame chain and synchronous events, (2) a SetMayHaveFrame assertion and nsCSSFrameConstructor::CreateFloatingLetterFrame, (3) nsCSSFrameConstructor::ConstructFrame, (4) the child list and initial reflow, (5) GetLastSpecialSibling, (6) nsFrameManager::GetPrimaryFrameFor and MathML, (7) nsFrame::GetBoxAscent, (8) nsCSSFrameConstructor::AdjustParentFrame, (9) nsDOMOfflineResourceList, and (10) nsContentUtils::ComparePosition.
	</description>
 </metadata>
<!-- 5a573a9051f013b865d54393922a35ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053613" comment="MozillaFirefox-branding-upstream less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053589" comment="MozillaFirefox-translations less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053590" comment="MozillaFirefox less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053591" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053596" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053597" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053592" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053599" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053593" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053595" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053614" comment="python-xpcom190 less than 1.9.0.12-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2463</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2463" source="CVE"/>
	<description>
	Multiple integer overflows in the (1) PL_Base64Decode and (2) PL_Base64Encode functions in nsprpub/lib/libc/src/base64.c in Mozilla Firefox before 3.0.12, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors that trigger buffer overflows.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3911462b3f68f3f2a965113f5b360cd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059214" comment="MozillaThunderbird-devel less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059215" comment="MozillaThunderbird-translations less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059216" comment="MozillaThunderbird less than 2.0.0.24-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 5a573a9051f013b865d54393922a35ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053613" comment="MozillaFirefox-branding-upstream less than 3.0.12-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053589" comment="MozillaFirefox-translations less than 3.0.12-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053590" comment="MozillaFirefox less than 3.0.12-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053591" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053596" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053597" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053592" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053599" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053593" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053595" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053614" comment="python-xpcom190 less than 1.9.0.12-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 905ae89bbd71f145a4b2ab6acdd1d659 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060701" comment="seamonkey-dom-inspector less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060702" comment="seamonkey-irc less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060703" comment="seamonkey-mail less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060704" comment="seamonkey-spellchecker less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060705" comment="seamonkey-venkman less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060706" comment="seamonkey less than 1.1.19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2464</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2464" source="CVE"/>
	<description>
	The nsXULTemplateQueryProcessorRDF::CheckIsSeparator function in Mozilla Firefox before 3.0.12, SeaMonkey 2.0a1pre, and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to loading multiple RDF files in a XUL tree element.
	</description>
 </metadata>
<!-- 5a573a9051f013b865d54393922a35ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053613" comment="MozillaFirefox-branding-upstream less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053589" comment="MozillaFirefox-translations less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053590" comment="MozillaFirefox less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053591" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053596" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053597" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053592" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053599" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053593" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053595" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053614" comment="python-xpcom190 less than 1.9.0.12-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2465</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2465" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.12 and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via vectors involving double frame construction, related to (1) nsHTMLContentSink.cpp, (2) nsXMLContentSink.cpp, and (3) nsPresShell.cpp, and the nsSubDocumentFrame::Reflow function.
	</description>
 </metadata>
<!-- 5a573a9051f013b865d54393922a35ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053613" comment="MozillaFirefox-branding-upstream less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053589" comment="MozillaFirefox-translations less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053590" comment="MozillaFirefox less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053591" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053596" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053597" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053592" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053599" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053593" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053595" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053614" comment="python-xpcom190 less than 1.9.0.12-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2466</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2466" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsDOMClassInfo.cpp, (2) JS_HashTableRawLookup, and (3) MirrorWrappedNativeParent and js_LockGCThingRT.
	</description>
 </metadata>
<!-- 5a573a9051f013b865d54393922a35ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053613" comment="MozillaFirefox-branding-upstream less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053589" comment="MozillaFirefox-translations less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053590" comment="MozillaFirefox less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053591" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053596" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053597" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053592" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053599" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053593" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053595" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053614" comment="python-xpcom190 less than 1.9.0.12-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2467</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2467" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.12 and 3.5 before 3.5.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a Flash object, a slow script dialog, and the unloading of the Flash plugin, which triggers attempted use of a deleted object.
	</description>
 </metadata>
<!-- 5a573a9051f013b865d54393922a35ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053613" comment="MozillaFirefox-branding-upstream less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053589" comment="MozillaFirefox-translations less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053590" comment="MozillaFirefox less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053591" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053596" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053597" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053592" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053599" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053593" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053595" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053614" comment="python-xpcom190 less than 1.9.0.12-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2469</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2469" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.12 does not properly handle an SVG element that has a property with a watch function and an __defineSetter__ function, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted document, related to a certain pointer misinterpretation.
	</description>
 </metadata>
<!-- 5a573a9051f013b865d54393922a35ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053613" comment="MozillaFirefox-branding-upstream less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053589" comment="MozillaFirefox-translations less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053590" comment="MozillaFirefox less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053591" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053596" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053597" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053592" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053599" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053593" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053595" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053614" comment="python-xpcom190 less than 1.9.0.12-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2471</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2471" source="CVE"/>
	<description>
	The setTimeout function in Mozilla Firefox before 3.0.12 does not properly preserve object wrapping, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via a crafted call, related to XPCNativeWrapper.
	</description>
 </metadata>
<!-- 5a573a9051f013b865d54393922a35ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053613" comment="MozillaFirefox-branding-upstream less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053589" comment="MozillaFirefox-translations less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053590" comment="MozillaFirefox less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053591" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053596" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053597" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053592" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053599" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053593" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053595" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053614" comment="python-xpcom190 less than 1.9.0.12-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2472</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2472" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.12 does not always use XPCCrossOriginWrapper when required during object construction, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted document, related to a "cross origin wrapper bypass."
	</description>
 </metadata>
<!-- 5a573a9051f013b865d54393922a35ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053613" comment="MozillaFirefox-branding-upstream less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053589" comment="MozillaFirefox-translations less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053590" comment="MozillaFirefox less than 3.0.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053591" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053596" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053597" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053592" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053599" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053593" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053595" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053614" comment="python-xpcom190 less than 1.9.0.12-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2473</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2473" source="CVE"/>
	<description>
	neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
	</description>
 </metadata>
<!-- 61e8a7944bfbd369b915673c77e34371 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055795" comment="libneon-devel less than 0.28.3-1.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055796" comment="libneon27-32bit less than 0.28.3-1.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055797" comment="libneon27-64bit less than 0.28.3-1.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055798" comment="libneon27 less than 0.28.3-1.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055799" comment="neon less than 0.28.3-1.31.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2475</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2475" source="CVE"/>
	<description>
	Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19373e96e1bed7939c7e0dfc0efd233f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055005" comment="java-1_6_0-openjdk-demo less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055006" comment="java-1_6_0-openjdk-devel less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055007" comment="java-1_6_0-openjdk-javadoc less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055008" comment="java-1_6_0-openjdk-plugin less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055009" comment="java-1_6_0-openjdk-src less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055010" comment="java-1_6_0-openjdk less than 1.6_b16-0.1.3"/>
		</criteria>
	</criteria>
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053757" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053758" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053759" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053760" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053761" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053762" comment="java-1_6_0-sun less than 1.6.0.u15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053764" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053765" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053766" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053767" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053768" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053769" comment="java-1_5_0-sun less than 1.5.0_update20-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2476</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2476" source="CVE"/>
	<description>
	The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19373e96e1bed7939c7e0dfc0efd233f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055005" comment="java-1_6_0-openjdk-demo less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055006" comment="java-1_6_0-openjdk-devel less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055007" comment="java-1_6_0-openjdk-javadoc less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055008" comment="java-1_6_0-openjdk-plugin less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055009" comment="java-1_6_0-openjdk-src less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055010" comment="java-1_6_0-openjdk less than 1.6_b16-0.1.3"/>
		</criteria>
	</criteria>
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053757" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053758" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053759" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053760" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053761" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053762" comment="java-1_6_0-sun less than 1.6.0.u15-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2493</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2493" source="CVE"/>
	<description>
	The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not properly restrict use of OleLoadFromStream in instantiating objects from data streams, which allows remote attackers to execute arbitrary code via a crafted HTML document with an ATL (1) component or (2) control, related to ATL headers and bypassing security policies, aka "ATL COM Initialization Vulnerability."
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053711" comment="flash-player less than 10.0.32.18-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2560</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace and is processed by the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissector. NOTE: it was later reported that the RADIUS issue also affects 0.10.13 through 1.0.9.
	</description>
 </metadata>
<!-- 8e08d9b8b625bc9fb7365a4b7e6d2187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056456" comment="wireshark-devel less than 1.0.4-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056457" comment="wireshark less than 1.0.4-2.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2562</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2562" source="CVE"/>
	<description>
	Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
<!-- 91a6f977f69fd5e485d5026e78bde299 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054526" comment="wireshark-devel less than 1.0.4-2.10.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054527" comment="wireshark less than 1.0.4-2.10.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2563</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2563" source="CVE"/>
	<description>
	Unspecified vulnerability in the Infiniband dissector in Wireshark 1.0.6 through 1.2.0, when running on unspecified platforms, allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
<!-- 57e7b64bcac302bbc9cfacbb58f14860 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058910" comment="wireshark-devel less than 1.0.4-2.14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058911" comment="wireshark less than 1.0.4-2.14.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2564</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2564" source="CVE"/>
	<description>
	NOS Microsystems getPlus Download Manager, as used in Adobe Reader 1.6.2.36 and possibly other versions, Corel getPlus Download Manager before 1.5.0.48, and possibly other products, installs NOS\bin\getPlus_HelperSvc.exe with insecure permissions (Everyone:Full Control), which allows local users to gain SYSTEM privileges by replacing getPlus_HelperSvc.exe with a Trojan horse program, as demonstrated by use of getPlus Download Manager within Adobe Reader. NOTE: within Adobe Reader, the scope of this issue is limited because the program is deleted and the associated service is not automatically launched after a successful installation and reboot.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2621</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2621" source="CVE"/>
	<description>
	Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 does not properly enforce "buffer limits and related bound checks," which allows remote attackers to cause a denial of service via (1) an incomplete request or (2) a request with a large header size, related to (a) HttpMsg.cc and (b) client_side.cc.
	</description>
 </metadata>
<!-- 70ac0a790fa150209a81f8b3b175d02f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059069" comment="squid-beta less than 3.0-438.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059070" comment="squid3 less than 3.0.STABLE10-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059071" comment="squid less than 2.7.STABLE5-1.21.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2622</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2622" source="CVE"/>
	<description>
	Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 allows remote attackers to cause a denial of service via malformed requests including (1) "missing or mismatched protocol identifier," (2) missing or negative status value," (3) "missing version," or (4) "missing or invalid status number," related to (a) HttpMsg.cc and (b) HttpReply.cc.
	</description>
 </metadata>
<!-- 70ac0a790fa150209a81f8b3b175d02f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059069" comment="squid-beta less than 3.0-438.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059070" comment="squid3 less than 3.0.STABLE10-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059071" comment="squid less than 2.7.STABLE5-1.21.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2624</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624" source="CVE"/>
	<description>
	The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive.  NOTE: this issue is caused by a CVE-2006-4334 regression.
	</description>
 </metadata>
<!-- cf2b0afd8f6b10f16eb564f537758acb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057454" comment="gzip less than 1.3.12-68.39.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2625</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625" source="CVE"/>
	<description>
	XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19373e96e1bed7939c7e0dfc0efd233f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055005" comment="java-1_6_0-openjdk-demo less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055006" comment="java-1_6_0-openjdk-devel less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055007" comment="java-1_6_0-openjdk-javadoc less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055008" comment="java-1_6_0-openjdk-plugin less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055009" comment="java-1_6_0-openjdk-src less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055010" comment="java-1_6_0-openjdk less than 1.6_b16-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 2cc68d0ce474e04b91d9bd5dd8ab3fd9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058346" comment="libexpat0-32bit less than 1.95.8-64.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058347" comment="libexpat0-64bit less than 1.95.8-64.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058348" comment="libexpat0 less than 1.95.8-64.50.1"/>
		</criteria>
	</criteria>
	<!-- 62f90b79cbd3a4c20d38b3691bf18913 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054463" comment="kompozer less than 0.7.99.0.4-1.3.1"/>
	</criteria>
	<!-- 63cd604284f0ecefce6f29b0f9c61d30 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060413" comment="libpython2_6-1_0-32bit less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060414" comment="libpython2_6-1_0-64bit less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060415" comment="libpython2_6-1_0 less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060416" comment="python-32bit less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060417" comment="python-64bit less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060418" comment="python-base-32bit less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060419" comment="python-base-64bit less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060420" comment="python-base less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060421" comment="python-curses less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060422" comment="python-demo less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060423" comment="python-devel less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060424" comment="python-gdbm less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060425" comment="python-idle less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060426" comment="python-tk less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060427" comment="python-xml less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060428" comment="python less than 2.6.0-2.23.1"/>
		</criteria>
	</criteria>
	<!-- cddc4c67c5e717923e57de74681f253e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054384" comment="xerces-j2-demo less than 2.8.1-238.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054385" comment="xerces-j2-javadoc-apis less than 2.8.1-238.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054386" comment="xerces-j2-javadoc-dom3 less than 2.8.1-238.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054387" comment="xerces-j2-javadoc-impl less than 2.8.1-238.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054388" comment="xerces-j2-javadoc-other less than 2.8.1-238.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054389" comment="xerces-j2-javadoc-xni less than 2.8.1-238.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054390" comment="xerces-j2-scripts less than 2.8.1-238.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054391" comment="xerces-j2-xml-apis less than 2.8.1-238.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054392" comment="xerces-j2-xml-resolver less than 2.8.1-238.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054393" comment="xerces-j2 less than 2.8.1-238.16.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2626</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2626" source="CVE"/>
	<description>
	The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0, 5.2.10, and earlier versions allows context-specific attackers to obtain sensitive information (memory contents) and cause a PHP crash by using the ini_set function to declare a variable, then using the ini_restore function to restore the variable.
	</description>
 </metadata>
<!-- 051e60b1cd753810bd1e57e8fa1e5d07 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058185" comment="apache2-mod_php5 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058186" comment="php5-bcmath less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058187" comment="php5-bz2 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058188" comment="php5-calendar less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058189" comment="php5-ctype less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058190" comment="php5-curl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058191" comment="php5-dba less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058192" comment="php5-dbase less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058193" comment="php5-devel less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058194" comment="php5-dom less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058195" comment="php5-exif less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058196" comment="php5-fastcgi less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058197" comment="php5-ftp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058198" comment="php5-gd less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058199" comment="php5-gettext less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058200" comment="php5-gmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058201" comment="php5-hash less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058202" comment="php5-iconv less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058203" comment="php5-imap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058204" comment="php5-json less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058205" comment="php5-ldap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058206" comment="php5-mbstring less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058207" comment="php5-mcrypt less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058208" comment="php5-mysql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058209" comment="php5-ncurses less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058210" comment="php5-odbc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058211" comment="php5-openssl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058212" comment="php5-pcntl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058213" comment="php5-pdo less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058214" comment="php5-pear less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058215" comment="php5-pgsql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058216" comment="php5-posix less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058217" comment="php5-pspell less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058218" comment="php5-readline less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058219" comment="php5-shmop less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058220" comment="php5-snmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058221" comment="php5-soap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058222" comment="php5-sockets less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058223" comment="php5-sqlite less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058224" comment="php5-suhosin less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058225" comment="php5-sysvmsg less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058226" comment="php5-sysvsem less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058227" comment="php5-sysvshm less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058228" comment="php5-tidy less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058229" comment="php5-tokenizer less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058230" comment="php5-wddx less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058231" comment="php5-xmlreader less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058232" comment="php5-xmlrpc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058233" comment="php5-xmlwriter less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058234" comment="php5-xsl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058235" comment="php5-zip less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058236" comment="php5-zlib less than 5.2.12-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2632</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2632" source="CVE"/>
	<description>
	Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4c6fb0616c0f857515d6214e8a743afd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055139" comment="dovecot11-backend-mysql less than 1.1.7-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055140" comment="dovecot11-backend-pgsql less than 1.1.7-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055141" comment="dovecot11-backend-sqlite less than 1.1.7-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055142" comment="dovecot11-devel less than 1.1.7-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055143" comment="dovecot11-fts-lucene less than 1.1.7-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055144" comment="dovecot11 less than 1.1.7-1.4.1"/>
		</criteria>
	</criteria>
	<!-- 755ce4d6ccf40fc2aaaf95a0beac23df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054971" comment="cyrus-imapd-devel less than 2.3.11-60.20.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054972" comment="cyrus-imapd less than 2.3.11-60.20.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054973" comment="perl-Cyrus-IMAP less than 2.3.11-60.20.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054974" comment="perl-Cyrus-SIEVE-managesieve less than 2.3.11-60.20.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2654</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.
	</description>
 </metadata>
<!-- b70be6e8a0fb54fc1d48288a01359e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054029" comment="MozillaFirefox-branding-upstream less than 3.0.13-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054030" comment="MozillaFirefox-branding-upstream less than 3.0.13-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053944" comment="MozillaFirefox-translations less than 3.0.13-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054031" comment="MozillaFirefox-translations less than 3.0.13-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053945" comment="MozillaFirefox less than 3.0.13-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054032" comment="MozillaFirefox less than 3.0.13-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054033" comment="gconf2-32bit less than 2.24.0-2.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054034" comment="gconf2 less than 2.24.0-2.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054035" comment="gconf2 less than 2.24.0-2.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054036" comment="libidl-32bit less than 0.8.11-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054037" comment="libidl-64bit less than 0.8.11-1.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054038" comment="libidl less than 0.8.11-1.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054039" comment="libidl less than 0.8.11-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054040" comment="libidl less than 0.8.11-1.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053952" comment="mozilla-xulrunner190-32bit less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053971" comment="mozilla-xulrunner190-devel less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053972" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053953" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053974" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053954" comment="mozilla-xulrunner190-translations less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053956" comment="mozilla-xulrunner190 less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054041" comment="orbit2-32bit less than 2.14.16-1.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054042" comment="orbit2-64bit less than 2.14.16-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054043" comment="orbit2 less than 2.14.16-1.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054044" comment="orbit2 less than 2.14.16-1.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054045" comment="orbit2 less than 2.14.16-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054046" comment="python-xpcom190 less than 1.9.0.13-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2661</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2661" source="CVE"/>
	<description>
	The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data.  NOTE: this is due to an incomplete fix for CVE-2009-2185.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1538fd78cacfab3671959251b90700ae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054977" comment="openswan-doc less than 2.6.16-1.49.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054978" comment="openswan less than 2.6.16-1.49.3"/>
		</criteria>
	</criteria>
	<!-- 801dcfbc71fdd1d72b972337c5ab58a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054983" comment="strongswan-doc less than 4.2.8-1.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054984" comment="strongswan less than 4.2.8-1.29.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2662</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2662" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the TraceRecorder::snapshot function in js/src/jstracer.cpp, and unspecified other vectors.
	</description>
 </metadata>
<!-- b70be6e8a0fb54fc1d48288a01359e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054029" comment="MozillaFirefox-branding-upstream less than 3.0.13-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054030" comment="MozillaFirefox-branding-upstream less than 3.0.13-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053944" comment="MozillaFirefox-translations less than 3.0.13-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054031" comment="MozillaFirefox-translations less than 3.0.13-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053945" comment="MozillaFirefox less than 3.0.13-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054032" comment="MozillaFirefox less than 3.0.13-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054033" comment="gconf2-32bit less than 2.24.0-2.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054034" comment="gconf2 less than 2.24.0-2.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054035" comment="gconf2 less than 2.24.0-2.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054036" comment="libidl-32bit less than 0.8.11-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054037" comment="libidl-64bit less than 0.8.11-1.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054038" comment="libidl less than 0.8.11-1.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054039" comment="libidl less than 0.8.11-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054040" comment="libidl less than 0.8.11-1.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053952" comment="mozilla-xulrunner190-32bit less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053971" comment="mozilla-xulrunner190-devel less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053972" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053953" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053974" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053954" comment="mozilla-xulrunner190-translations less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053956" comment="mozilla-xulrunner190 less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054041" comment="orbit2-32bit less than 2.14.16-1.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054042" comment="orbit2-64bit less than 2.14.16-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054043" comment="orbit2 less than 2.14.16-1.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054044" comment="orbit2 less than 2.14.16-1.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054045" comment="orbit2 less than 2.14.16-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054046" comment="python-xpcom190 less than 1.9.0.13-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2663</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663" source="CVE"/>
	<description>
	libvorbis before r16182, as used in Mozilla Firefox 3.5.x before 3.5.2 and other products, allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .ogg file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6685d2c578c4715cbdac8c7840bf7447 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061110" comment="libvorbis-32bit less than 1.2.0-78.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061111" comment="libvorbis-64bit less than 1.2.0-78.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061112" comment="libvorbis-devel less than 1.2.0-78.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061113" comment="libvorbis-doc less than 1.2.0-78.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061114" comment="libvorbis less than 1.2.0-78.17.1"/>
		</criteria>
	</criteria>
	<!-- b70be6e8a0fb54fc1d48288a01359e1d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054029" comment="MozillaFirefox-branding-upstream less than 3.0.13-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054030" comment="MozillaFirefox-branding-upstream less than 3.0.13-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053944" comment="MozillaFirefox-translations less than 3.0.13-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054031" comment="MozillaFirefox-translations less than 3.0.13-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053945" comment="MozillaFirefox less than 3.0.13-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054032" comment="MozillaFirefox less than 3.0.13-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054033" comment="gconf2-32bit less than 2.24.0-2.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054034" comment="gconf2 less than 2.24.0-2.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054035" comment="gconf2 less than 2.24.0-2.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054036" comment="libidl-32bit less than 0.8.11-1.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054037" comment="libidl-64bit less than 0.8.11-1.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054038" comment="libidl less than 0.8.11-1.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054039" comment="libidl less than 0.8.11-1.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054040" comment="libidl less than 0.8.11-1.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053952" comment="mozilla-xulrunner190-32bit less than 1.9.0.13-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053971" comment="mozilla-xulrunner190-devel less than 1.9.0.13-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053972" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.13-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053953" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.13-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053974" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.13-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053954" comment="mozilla-xulrunner190-translations less than 1.9.0.13-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053956" comment="mozilla-xulrunner190 less than 1.9.0.13-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054041" comment="orbit2-32bit less than 2.14.16-1.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054042" comment="orbit2-64bit less than 2.14.16-1.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054043" comment="orbit2 less than 2.14.16-1.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054044" comment="orbit2 less than 2.14.16-1.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054045" comment="orbit2 less than 2.14.16-1.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054046" comment="python-xpcom190 less than 1.9.0.13-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2664</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2664" source="CVE"/>
	<description>
	The js_watch_set function in js/src/jsdbgapi.cpp in the JavaScript engine in Mozilla Firefox before 3.0.12 allows remote attackers to cause a denial of service (assertion failure and application exit) or possibly execute arbitrary code via a crafted .js file, related to a "memory safety bug." NOTE: this was originally reported as affecting versions before 3.0.13.
	</description>
 </metadata>
<!-- b70be6e8a0fb54fc1d48288a01359e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054029" comment="MozillaFirefox-branding-upstream less than 3.0.13-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054030" comment="MozillaFirefox-branding-upstream less than 3.0.13-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053944" comment="MozillaFirefox-translations less than 3.0.13-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054031" comment="MozillaFirefox-translations less than 3.0.13-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053945" comment="MozillaFirefox less than 3.0.13-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054032" comment="MozillaFirefox less than 3.0.13-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054033" comment="gconf2-32bit less than 2.24.0-2.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054034" comment="gconf2 less than 2.24.0-2.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054035" comment="gconf2 less than 2.24.0-2.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054036" comment="libidl-32bit less than 0.8.11-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054037" comment="libidl-64bit less than 0.8.11-1.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054038" comment="libidl less than 0.8.11-1.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054039" comment="libidl less than 0.8.11-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054040" comment="libidl less than 0.8.11-1.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053952" comment="mozilla-xulrunner190-32bit less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053971" comment="mozilla-xulrunner190-devel less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053972" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053953" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053974" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053954" comment="mozilla-xulrunner190-translations less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053956" comment="mozilla-xulrunner190 less than 1.9.0.13-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054041" comment="orbit2-32bit less than 2.14.16-1.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054042" comment="orbit2-64bit less than 2.14.16-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054043" comment="orbit2 less than 2.14.16-1.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054044" comment="orbit2 less than 2.14.16-1.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054045" comment="orbit2 less than 2.14.16-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054046" comment="python-xpcom190 less than 1.9.0.13-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2666</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666" source="CVE"/>
	<description>
	socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- fb167fbbc414765fe96c2fd6c188d65f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053829" comment="fetchmail less than 6.3.8.90-12.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053830" comment="fetchmailconf less than 6.3.8.90-12.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2670</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2670" source="CVE"/>
	<description>
	The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19373e96e1bed7939c7e0dfc0efd233f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055005" comment="java-1_6_0-openjdk-demo less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055006" comment="java-1_6_0-openjdk-devel less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055007" comment="java-1_6_0-openjdk-javadoc less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055008" comment="java-1_6_0-openjdk-plugin less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055009" comment="java-1_6_0-openjdk-src less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055010" comment="java-1_6_0-openjdk less than 1.6_b16-0.1.3"/>
		</criteria>
	</criteria>
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053757" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053758" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053759" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053760" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053761" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053762" comment="java-1_6_0-sun less than 1.6.0.u15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053764" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053765" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053766" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053767" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053768" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053769" comment="java-1_5_0-sun less than 1.5.0_update20-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2671</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2671" source="CVE"/>
	<description>
	The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19373e96e1bed7939c7e0dfc0efd233f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055005" comment="java-1_6_0-openjdk-demo less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055006" comment="java-1_6_0-openjdk-devel less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055007" comment="java-1_6_0-openjdk-javadoc less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055008" comment="java-1_6_0-openjdk-plugin less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055009" comment="java-1_6_0-openjdk-src less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055010" comment="java-1_6_0-openjdk less than 1.6_b16-0.1.3"/>
		</criteria>
	</criteria>
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053757" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053758" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053759" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053760" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053761" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053762" comment="java-1_6_0-sun less than 1.6.0.u15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053764" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053765" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053766" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053767" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053768" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053769" comment="java-1_5_0-sun less than 1.5.0_update20-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2672</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2672" source="CVE"/>
	<description>
	The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19373e96e1bed7939c7e0dfc0efd233f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055005" comment="java-1_6_0-openjdk-demo less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055006" comment="java-1_6_0-openjdk-devel less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055007" comment="java-1_6_0-openjdk-javadoc less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055008" comment="java-1_6_0-openjdk-plugin less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055009" comment="java-1_6_0-openjdk-src less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055010" comment="java-1_6_0-openjdk less than 1.6_b16-0.1.3"/>
		</criteria>
	</criteria>
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053757" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053758" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053759" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053760" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053761" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053762" comment="java-1_6_0-sun less than 1.6.0.u15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053764" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053765" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053766" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053767" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053768" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053769" comment="java-1_5_0-sun less than 1.5.0_update20-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2673</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2673" source="CVE"/>
	<description>
	The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19373e96e1bed7939c7e0dfc0efd233f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055005" comment="java-1_6_0-openjdk-demo less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055006" comment="java-1_6_0-openjdk-devel less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055007" comment="java-1_6_0-openjdk-javadoc less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055008" comment="java-1_6_0-openjdk-plugin less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055009" comment="java-1_6_0-openjdk-src less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055010" comment="java-1_6_0-openjdk less than 1.6_b16-0.1.3"/>
		</criteria>
	</criteria>
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053757" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053758" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053759" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053760" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053761" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053762" comment="java-1_6_0-sun less than 1.6.0.u15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053764" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053765" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053766" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053767" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053768" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053769" comment="java-1_5_0-sun less than 1.5.0_update20-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2674</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2674" source="CVE"/>
	<description>
	Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19373e96e1bed7939c7e0dfc0efd233f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055005" comment="java-1_6_0-openjdk-demo less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055006" comment="java-1_6_0-openjdk-devel less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055007" comment="java-1_6_0-openjdk-javadoc less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055008" comment="java-1_6_0-openjdk-plugin less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055009" comment="java-1_6_0-openjdk-src less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055010" comment="java-1_6_0-openjdk less than 1.6_b16-0.1.3"/>
		</criteria>
	</criteria>
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053757" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053758" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053759" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053760" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053761" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053762" comment="java-1_6_0-sun less than 1.6.0.u15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053764" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053765" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053766" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053767" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053768" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053769" comment="java-1_5_0-sun less than 1.5.0_update20-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2675</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2675" source="CVE"/>
	<description>
	Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19373e96e1bed7939c7e0dfc0efd233f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055005" comment="java-1_6_0-openjdk-demo less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055006" comment="java-1_6_0-openjdk-devel less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055007" comment="java-1_6_0-openjdk-javadoc less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055008" comment="java-1_6_0-openjdk-plugin less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055009" comment="java-1_6_0-openjdk-src less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055010" comment="java-1_6_0-openjdk less than 1.6_b16-0.1.3"/>
		</criteria>
	</criteria>
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053757" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053758" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053759" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053760" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053761" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053762" comment="java-1_6_0-sun less than 1.6.0.u15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053764" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053765" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053766" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053767" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053768" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053769" comment="java-1_5_0-sun less than 1.5.0_update20-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2676</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2676" source="CVE"/>
	<description>
	Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053757" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053758" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053759" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053760" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053761" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053762" comment="java-1_6_0-sun less than 1.6.0.u15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053764" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053765" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053766" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053767" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053768" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053769" comment="java-1_5_0-sun less than 1.5.0_update20-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2687</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2687" source="CVE"/>
	<description>
	The exif_read_data function in the Exif module in PHP before 5.2.10 allows remote attackers to cause a denial of service (crash) via a malformed JPEG image with invalid offset fields, a different issue than CVE-2005-3353.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 051e60b1cd753810bd1e57e8fa1e5d07 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058185" comment="apache2-mod_php5 less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058186" comment="php5-bcmath less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058187" comment="php5-bz2 less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058188" comment="php5-calendar less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058189" comment="php5-ctype less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058190" comment="php5-curl less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058191" comment="php5-dba less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058192" comment="php5-dbase less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058193" comment="php5-devel less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058194" comment="php5-dom less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058195" comment="php5-exif less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058196" comment="php5-fastcgi less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058197" comment="php5-ftp less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058198" comment="php5-gd less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058199" comment="php5-gettext less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058200" comment="php5-gmp less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058201" comment="php5-hash less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058202" comment="php5-iconv less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058203" comment="php5-imap less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058204" comment="php5-json less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058205" comment="php5-ldap less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058206" comment="php5-mbstring less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058207" comment="php5-mcrypt less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058208" comment="php5-mysql less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058209" comment="php5-ncurses less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058210" comment="php5-odbc less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058211" comment="php5-openssl less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058212" comment="php5-pcntl less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058213" comment="php5-pdo less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058214" comment="php5-pear less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058215" comment="php5-pgsql less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058216" comment="php5-posix less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058217" comment="php5-pspell less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058218" comment="php5-readline less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058219" comment="php5-shmop less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058220" comment="php5-snmp less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058221" comment="php5-soap less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058222" comment="php5-sockets less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058223" comment="php5-sqlite less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058224" comment="php5-suhosin less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058225" comment="php5-sysvmsg less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058226" comment="php5-sysvsem less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058227" comment="php5-sysvshm less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058228" comment="php5-tidy less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058229" comment="php5-tokenizer less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058230" comment="php5-wddx less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058231" comment="php5-xmlreader less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058232" comment="php5-xmlrpc less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058233" comment="php5-xmlwriter less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058234" comment="php5-xsl less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058235" comment="php5-zip less than 5.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058236" comment="php5-zlib less than 5.2.12-0.1.1"/>
		</criteria>
	</criteria>
	<!-- cef8c37e542688ee2ca3e259a02c041f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055298" comment="apache2-mod_php5 less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055299" comment="php5-bcmath less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055300" comment="php5-bz2 less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055301" comment="php5-calendar less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055302" comment="php5-ctype less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055303" comment="php5-curl less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055304" comment="php5-dba less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055305" comment="php5-dbase less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055306" comment="php5-devel less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055307" comment="php5-dom less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055308" comment="php5-exif less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055309" comment="php5-fastcgi less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055310" comment="php5-ftp less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055311" comment="php5-gd less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055312" comment="php5-gettext less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055313" comment="php5-gmp less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055314" comment="php5-hash less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055315" comment="php5-iconv less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055316" comment="php5-imap less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055317" comment="php5-json less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055318" comment="php5-ldap less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055319" comment="php5-mbstring less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055320" comment="php5-mcrypt less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055321" comment="php5-mysql less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055322" comment="php5-ncurses less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055323" comment="php5-odbc less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055324" comment="php5-openssl less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055325" comment="php5-pcntl less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055326" comment="php5-pdo less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055327" comment="php5-pear less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055328" comment="php5-pgsql less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055329" comment="php5-posix less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055330" comment="php5-pspell less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055331" comment="php5-readline less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055332" comment="php5-shmop less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055333" comment="php5-snmp less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055334" comment="php5-soap less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055335" comment="php5-sockets less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055336" comment="php5-sqlite less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055337" comment="php5-suhosin less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055338" comment="php5-sysvmsg less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055339" comment="php5-sysvsem less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055340" comment="php5-sysvshm less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055341" comment="php5-tidy less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055342" comment="php5-tokenizer less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055343" comment="php5-wddx less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055344" comment="php5-xmlreader less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055345" comment="php5-xmlrpc less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055346" comment="php5-xmlwriter less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055347" comment="php5-xsl less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055348" comment="php5-zip less than 5.2.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055349" comment="php5-zlib less than 5.2.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2688</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2688" source="CVE"/>
	<description>
	Multiple integer overflows in glyphs-eimage.c in XEmacs 21.4.22, when running on Windows, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) the tiff_instantiate function processing a crafted TIFF file, (2) the png_instantiate function processing a crafted PNG file, and (3) the jpeg_instantiate function processing a crafted JPEG file, all which trigger a heap-based buffer overflow.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
	</description>
 </metadata>
<!-- e6ee4ec015c33dd7280fb4997105605a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054277" comment="xemacs-el less than 21.5.28.20080401-58.17.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054278" comment="xemacs-info less than 21.5.28.20080401-58.17.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054279" comment="xemacs less than 21.5.28.20080401-58.17.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2689</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2689" source="CVE"/>
	<description>
	JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19373e96e1bed7939c7e0dfc0efd233f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055005" comment="java-1_6_0-openjdk-demo less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055006" comment="java-1_6_0-openjdk-devel less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055007" comment="java-1_6_0-openjdk-javadoc less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055008" comment="java-1_6_0-openjdk-plugin less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055009" comment="java-1_6_0-openjdk-src less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055010" comment="java-1_6_0-openjdk less than 1.6_b16-0.1.3"/>
		</criteria>
	</criteria>
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053757" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053758" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053759" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053760" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053761" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053762" comment="java-1_6_0-sun less than 1.6.0.u15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053764" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053765" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053766" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053767" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053768" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053769" comment="java-1_5_0-sun less than 1.5.0_update20-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2690</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2690" source="CVE"/>
	<description>
	The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19373e96e1bed7939c7e0dfc0efd233f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055005" comment="java-1_6_0-openjdk-demo less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055006" comment="java-1_6_0-openjdk-devel less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055007" comment="java-1_6_0-openjdk-javadoc less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055008" comment="java-1_6_0-openjdk-plugin less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055009" comment="java-1_6_0-openjdk-src less than 1.6_b16-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055010" comment="java-1_6_0-openjdk less than 1.6_b16-0.1.3"/>
		</criteria>
	</criteria>
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053757" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053758" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053759" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053760" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053761" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053762" comment="java-1_6_0-sun less than 1.6.0.u15-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2692</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692" source="CVE"/>
	<description>
	The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
	</description>
 </metadata>
<!-- 9ea1d108afb7e0239650848c8d9cd8fc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054196" comment="aufs-kmp-debug less than cvs20081020_2.6.27.29_0.1-1.32.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054197" comment="aufs-kmp-trace less than cvs20081020_2.6.27.29_0.1-1.32.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054198" comment="brocade-bfa-kmp-debug less than 1.1.0.2_2.6.27.29_0.1-1.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054199" comment="brocade-bfa-kmp-trace less than 1.1.0.2_2.6.27.29_0.1-1.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054200" comment="dazuko-kmp-debug less than 2.3.6_2.6.27.29_0.1-1.49.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054201" comment="dazuko-kmp-trace less than 2.3.6_2.6.27.29_0.1-1.49.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054202" comment="drbd-kmp-debug less than 8.2.7_2.6.27.29_0.1-1.19.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054203" comment="drbd-kmp-trace less than 8.2.7_2.6.27.29_0.1-1.19.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054204" comment="intel-iamt-heci-kmp-debug less than 3.1.0.31_2.6.27.29_0.1-2.40.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054205" comment="intel-iamt-heci-kmp-trace less than 3.1.0.31_2.6.27.29_0.1-2.40.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054206" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.29_0.1-89.11.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054207" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.29_0.1-89.11.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054208" comment="kernel-debug-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054209" comment="kernel-debug-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054210" comment="kernel-debug less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054108" comment="kernel-default-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054182" comment="kernel-default-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054109" comment="kernel-default less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054211" comment="kernel-docs less than 2.6.3-3.13.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054180" comment="kernel-ec2-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054212" comment="kernel-ec2-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054181" comment="kernel-ec2 less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054119" comment="kernel-kdump less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054110" comment="kernel-pae-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054183" comment="kernel-pae-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054111" comment="kernel-pae less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054120" comment="kernel-ppc64-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054213" comment="kernel-ppc64-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054121" comment="kernel-ppc64 less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054214" comment="kernel-ps3 less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054112" comment="kernel-source less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054113" comment="kernel-syms less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054215" comment="kernel-trace-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054216" comment="kernel-trace-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054217" comment="kernel-trace less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054218" comment="kernel-vanilla less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054116" comment="kernel-xen-base less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054184" comment="kernel-xen-extra less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054117" comment="kernel-xen less than 2.6.27.29-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054219" comment="kqemu-kmp-debug less than 1.4.0pre1_2.6.27.29_0.1-2.1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054220" comment="kqemu-kmp-trace less than 1.4.0pre1_2.6.27.29_0.1-2.1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054221" comment="kvm-kmp-trace less than 78_2.6.27.29_0.1-6.7.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054222" comment="lirc-kmp-trace less than 0.8.4_2.6.27.29_0.1-0.1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054223" comment="ofed-kmp-debug less than 1.4_2.6.27.29_0.1-21.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054224" comment="ofed-kmp-trace less than 1.4_2.6.27.29_0.1-21.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054225" comment="oracleasm-kmp-debug less than 2.0.5_2.6.27.29_0.1-2.36.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054226" comment="oracleasm-kmp-trace less than 2.0.5_2.6.27.29_0.1-2.36.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054227" comment="pcfclock-kmp-debug less than 0.44_2.6.27.29_0.1-227.56.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054228" comment="pcfclock-kmp-trace less than 0.44_2.6.27.29_0.1-227.56.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054229" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.29_0.1-2.8.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054230" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.29_0.1-2.8.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054231" comment="vmware-kmp-debug less than 2008.09.03_2.6.27.29_0.1-5.50.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054232" comment="vmware-kmp-trace less than 2008.09.03_2.6.27.29_0.1-5.50.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2693</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693" source="CVE"/>
	<description>
	Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.
	</description>
 </metadata>
<!-- 7e1e6b6f70f7446f288f1801380c41c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059317" comment="tomcat6-admin-webapps less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059318" comment="tomcat6-docs-webapp less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059319" comment="tomcat6-javadoc less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059320" comment="tomcat6-jsp-2_1-api less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059321" comment="tomcat6-lib less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059322" comment="tomcat6-servlet-2_5-api less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059323" comment="tomcat6-webapps less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059324" comment="tomcat6 less than 6.0.18-16.3.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2694</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694" source="CVE"/>
	<description>
	The msn_slplink_process_msg function in libpurple/protocols/msn/slplink.c in libpurple, as used in Pidgin (formerly Gaim) before 2.5.9 and Adium 1.3.5 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by sending multiple crafted SLP (aka MSNSLP) messages to trigger an overwrite of an arbitrary memory location.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1376.
	</description>
 </metadata>
<!-- 06ca1d5a54f2a96ff665c2afad49154c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054473" comment="finch-devel less than 2.5.1-3.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054474" comment="finch less than 2.5.1-3.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054475" comment="libpurple-devel less than 2.5.1-3.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054476" comment="libpurple-lang less than 2.5.1-3.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054477" comment="libpurple-meanwhile less than 2.5.1-3.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054478" comment="libpurple-mono less than 2.5.1-3.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054479" comment="libpurple less than 2.5.1-3.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054480" comment="pidgin-devel less than 2.5.1-3.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054481" comment="pidgin less than 2.5.1-3.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2700</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2700" source="CVE"/>
	<description>
	src/network/ssl/qsslcertificate.cpp in Nokia Trolltech Qt 4.x does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- 184a5ac237b657f1e7e088e8eb689f81 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056178" comment="libqt4-32bit less than 4.4.3-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056179" comment="libqt4-64bit less than 4.4.3-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056180" comment="libqt4-devel less than 4.4.3-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056181" comment="libqt4-qt3support-32bit less than 4.4.3-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056182" comment="libqt4-qt3support-64bit less than 4.4.3-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056183" comment="libqt4-qt3support less than 4.4.3-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056184" comment="libqt4-sql-32bit less than 4.4.3-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056185" comment="libqt4-sql-64bit less than 4.4.3-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056186" comment="libqt4-sql-sqlite less than 4.4.3-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056187" comment="libqt4-sql less than 4.4.3-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056188" comment="libqt4-x11-32bit less than 4.4.3-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056189" comment="libqt4-x11-64bit less than 4.4.3-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056190" comment="libqt4-x11 less than 4.4.3-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056191" comment="libqt4 less than 4.4.3-4.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2730</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2730" source="CVE"/>
	<description>
	libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
	</description>
 </metadata>
<!-- 012991c059eaec5ca5ff8127859c4bd5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054802" comment="gnutls less than 2.4.1-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054803" comment="libgnutls-devel less than 2.4.1-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054804" comment="libgnutls-extra-devel less than 2.4.1-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054805" comment="libgnutls-extra26 less than 2.4.1-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054806" comment="libgnutls26-32bit less than 2.4.1-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054807" comment="libgnutls26-64bit less than 2.4.1-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054808" comment="libgnutls26 less than 2.4.1-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2813</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813" source="CVE"/>
	<description>
	Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories.
	</description>
 </metadata>
<!-- ed5800f3f23ff36656d08ea5801f483c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055671" comment="cifs-mount less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055672" comment="ldapsmb less than 1.34b-6.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055673" comment="libnetapi-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055674" comment="libnetapi0 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055675" comment="libsmbclient-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055676" comment="libsmbclient0-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055677" comment="libsmbclient0-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055678" comment="libsmbclient0 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055679" comment="libsmbsharemodes-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055680" comment="libsmbsharemodes0 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055681" comment="libtalloc-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055682" comment="libtalloc1-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055683" comment="libtalloc1-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055684" comment="libtalloc1 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055685" comment="libtdb-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055686" comment="libtdb1-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055687" comment="libtdb1-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055688" comment="libtdb1 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055689" comment="libwbclient-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055690" comment="libwbclient0-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055691" comment="libwbclient0-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055692" comment="libwbclient0 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055693" comment="samba-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055694" comment="samba-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055695" comment="samba-client-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055696" comment="samba-client-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055697" comment="samba-client less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055698" comment="samba-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055699" comment="samba-krb-printing less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055700" comment="samba-vscan less than 0.3.6b-6.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055701" comment="samba-winbind-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055702" comment="samba-winbind-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055703" comment="samba-winbind less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055704" comment="samba less than 3.2.7-11.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2820</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2820" source="CVE"/>
	<description>
	The web interface in CUPS before 1.4.2, as used on Apple Mac OS X before 10.6.2 and other platforms, does not properly handle (1) HTTP headers and (2) HTML templates, which allows remote attackers to conduct cross-site scripting (XSS) attacks and HTTP response splitting attacks via vectors related to (a) the product's web interface, (b) the configuration of the print system, and (c) the titles of printed jobs, as demonstrated by an XSS attack that uses the kerberos parameter to the admin program, and leverages attribute injection and HTTP Parameter Pollution (HPP) issues.
	</description>
 </metadata>
<!-- 833958b7059e178a154c45274afaf446 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056130" comment="cups-client less than 1.3.9-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056131" comment="cups-devel less than 1.3.9-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056132" comment="cups-libs-32bit less than 1.3.9-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056133" comment="cups-libs-64bit less than 1.3.9-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056134" comment="cups-libs less than 1.3.9-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056135" comment="cups less than 1.3.9-7.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2848</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2848" source="CVE"/>
	<description>
	The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current-&gt;clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
	</description>
 </metadata>
<!-- 9005a00b713c8002f900881c513b1beb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055841" comment="kernel-debug-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055842" comment="kernel-debug-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055843" comment="kernel-debug less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055844" comment="kernel-default-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055845" comment="kernel-default-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055846" comment="kernel-default less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055847" comment="kernel-docs less than 2.6.3-3.13.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055848" comment="kernel-ec2-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055849" comment="kernel-ec2-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055850" comment="kernel-ec2 less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055851" comment="kernel-kdump less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055852" comment="kernel-pae-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055853" comment="kernel-pae-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055854" comment="kernel-pae less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055855" comment="kernel-ppc64-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055856" comment="kernel-ppc64-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055857" comment="kernel-ppc64 less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055858" comment="kernel-ps3 less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055859" comment="kernel-source less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055860" comment="kernel-syms less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055861" comment="kernel-trace-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055862" comment="kernel-trace-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055863" comment="kernel-trace less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055864" comment="kernel-vanilla less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055865" comment="kernel-xen-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055866" comment="kernel-xen-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055867" comment="kernel-xen less than 2.6.27.37-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2855</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2855" source="CVE"/>
	<description>
	The strListGetItem function in src/HttpHeaderTools.c in Squid 2.7 allows remote attackers to cause a denial of service via a crafted auth header with certain comma delimiters that trigger an infinite loop of calls to the strcspn function.
	</description>
 </metadata>
<!-- 70ac0a790fa150209a81f8b3b175d02f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059069" comment="squid-beta less than 3.0-438.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059070" comment="squid3 less than 3.0.STABLE10-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059071" comment="squid less than 2.7.STABLE5-1.21.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2901</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901" source="CVE"/>
	<description>
	The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.
	</description>
 </metadata>
<!-- 7e1e6b6f70f7446f288f1801380c41c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059317" comment="tomcat6-admin-webapps less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059318" comment="tomcat6-docs-webapp less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059319" comment="tomcat6-javadoc less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059320" comment="tomcat6-jsp-2_1-api less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059321" comment="tomcat6-lib less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059322" comment="tomcat6-servlet-2_5-api less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059323" comment="tomcat6-webapps less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059324" comment="tomcat6 less than 6.0.18-16.3.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2902</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902" source="CVE"/>
	<description>
	Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.
	</description>
 </metadata>
<!-- 7e1e6b6f70f7446f288f1801380c41c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059317" comment="tomcat6-admin-webapps less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059318" comment="tomcat6-docs-webapp less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059319" comment="tomcat6-javadoc less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059320" comment="tomcat6-jsp-2_1-api less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059321" comment="tomcat6-lib less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059322" comment="tomcat6-servlet-2_5-api less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059323" comment="tomcat6-webapps less than 6.0.18-16.3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059324" comment="tomcat6 less than 6.0.18-16.3.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2903</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2903" source="CVE"/>
	<description>
	Memory leak in the appletalk subsystem in the Linux kernel 2.4.x through 2.4.37.6 and 2.6.x through 2.6.31, when the appletalk and ipddp modules are loaded but the ipddp"N" device is not found, allows remote attackers to cause a denial of service (memory consumption) via IP-DDP datagrams.
	</description>
 </metadata>
<!-- 971c806ecaf91d73fc2850362bf9f623 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056428" comment="kernel-debug-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056429" comment="kernel-debug-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056430" comment="kernel-debug less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056431" comment="kernel-default-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056432" comment="kernel-default-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056433" comment="kernel-default less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056434" comment="kernel-docs less than 2.6.3-3.13.66"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056435" comment="kernel-kdump less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056436" comment="kernel-pae-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056437" comment="kernel-pae-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056438" comment="kernel-pae less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056439" comment="kernel-ppc64-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056440" comment="kernel-ppc64-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056441" comment="kernel-ppc64 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056442" comment="kernel-ps3 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056443" comment="kernel-source less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056444" comment="kernel-syms less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056445" comment="kernel-trace-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056446" comment="kernel-trace-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056447" comment="kernel-trace less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056448" comment="kernel-vanilla less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056449" comment="kernel-xen-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056450" comment="kernel-xen-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056451" comment="kernel-xen less than 2.6.27.39-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2905</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2905" source="CVE"/>
	<description>
	Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box.
	</description>
 </metadata>
<!-- a653de9011a155a32e8510c3e40539a7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055424" comment="libnewt0_52 less than 0.52.10-1.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055425" comment="newt-devel less than 0.52.10-1.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055426" comment="newt-doc less than 0.52.10-1.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055427" comment="newt-static less than 0.52.10-1.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055428" comment="newt less than 0.52.10-1.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055429" comment="python-newt less than 0.52.10-1.40.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2906</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906" source="CVE"/>
	<description>
	smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.
	</description>
 </metadata>
<!-- ed5800f3f23ff36656d08ea5801f483c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055671" comment="cifs-mount less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055672" comment="ldapsmb less than 1.34b-6.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055673" comment="libnetapi-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055674" comment="libnetapi0 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055675" comment="libsmbclient-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055676" comment="libsmbclient0-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055677" comment="libsmbclient0-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055678" comment="libsmbclient0 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055679" comment="libsmbsharemodes-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055680" comment="libsmbsharemodes0 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055681" comment="libtalloc-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055682" comment="libtalloc1-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055683" comment="libtalloc1-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055684" comment="libtalloc1 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055685" comment="libtdb-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055686" comment="libtdb1-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055687" comment="libtdb1-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055688" comment="libtdb1 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055689" comment="libwbclient-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055690" comment="libwbclient0-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055691" comment="libwbclient0-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055692" comment="libwbclient0 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055693" comment="samba-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055694" comment="samba-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055695" comment="samba-client-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055696" comment="samba-client-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055697" comment="samba-client less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055698" comment="samba-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055699" comment="samba-krb-printing less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055700" comment="samba-vscan less than 0.3.6b-6.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055701" comment="samba-winbind-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055702" comment="samba-winbind-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055703" comment="samba-winbind less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055704" comment="samba less than 3.2.7-11.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2909</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2909" source="CVE"/>
	<description>
	Integer signedness error in the ax25_setsockopt function in net/ax25/af_ax25.c in the ax25 subsystem in the Linux kernel before 2.6.31.2 allows local users to cause a denial of service (OOPS) via a crafted optlen value in an SO_BINDTODEVICE operation.
	</description>
 </metadata>
<!-- 9005a00b713c8002f900881c513b1beb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055841" comment="kernel-debug-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055842" comment="kernel-debug-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055843" comment="kernel-debug less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055844" comment="kernel-default-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055845" comment="kernel-default-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055846" comment="kernel-default less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055847" comment="kernel-docs less than 2.6.3-3.13.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055848" comment="kernel-ec2-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055849" comment="kernel-ec2-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055850" comment="kernel-ec2 less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055851" comment="kernel-kdump less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055852" comment="kernel-pae-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055853" comment="kernel-pae-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055854" comment="kernel-pae less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055855" comment="kernel-ppc64-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055856" comment="kernel-ppc64-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055857" comment="kernel-ppc64 less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055858" comment="kernel-ps3 less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055859" comment="kernel-source less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055860" comment="kernel-syms less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055861" comment="kernel-trace-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055862" comment="kernel-trace-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055863" comment="kernel-trace less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055864" comment="kernel-vanilla less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055865" comment="kernel-xen-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055866" comment="kernel-xen-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055867" comment="kernel-xen less than 2.6.27.37-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2910</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2910" source="CVE"/>
	<description>
	arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9005a00b713c8002f900881c513b1beb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055841" comment="kernel-debug-base less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055842" comment="kernel-debug-extra less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055843" comment="kernel-debug less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055844" comment="kernel-default-base less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055845" comment="kernel-default-extra less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055846" comment="kernel-default less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055847" comment="kernel-docs less than 2.6.3-3.13.55"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055848" comment="kernel-ec2-base less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055849" comment="kernel-ec2-extra less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055850" comment="kernel-ec2 less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055851" comment="kernel-kdump less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055852" comment="kernel-pae-base less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055853" comment="kernel-pae-extra less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055854" comment="kernel-pae less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055855" comment="kernel-ppc64-base less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055856" comment="kernel-ppc64-extra less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055857" comment="kernel-ppc64 less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055858" comment="kernel-ps3 less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055859" comment="kernel-source less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055860" comment="kernel-syms less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055861" comment="kernel-trace-base less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055862" comment="kernel-trace-extra less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055863" comment="kernel-trace less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055864" comment="kernel-vanilla less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055865" comment="kernel-xen-base less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055866" comment="kernel-xen-extra less than 2.6.27.37-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055867" comment="kernel-xen less than 2.6.27.37-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 971c806ecaf91d73fc2850362bf9f623 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056428" comment="kernel-debug-base less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056429" comment="kernel-debug-extra less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056430" comment="kernel-debug less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056431" comment="kernel-default-base less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056432" comment="kernel-default-extra less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056433" comment="kernel-default less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056434" comment="kernel-docs less than 2.6.3-3.13.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056435" comment="kernel-kdump less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056436" comment="kernel-pae-base less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056437" comment="kernel-pae-extra less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056438" comment="kernel-pae less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056439" comment="kernel-ppc64-base less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056440" comment="kernel-ppc64-extra less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056441" comment="kernel-ppc64 less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056442" comment="kernel-ps3 less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056443" comment="kernel-source less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056444" comment="kernel-syms less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056445" comment="kernel-trace-base less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056446" comment="kernel-trace-extra less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056447" comment="kernel-trace less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056448" comment="kernel-vanilla less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056449" comment="kernel-xen-base less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056450" comment="kernel-xen-extra less than 2.6.27.39-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056451" comment="kernel-xen less than 2.6.27.39-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2948</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948" source="CVE"/>
	<description>
	mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option.
	</description>
 </metadata>
<!-- ed5800f3f23ff36656d08ea5801f483c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055671" comment="cifs-mount less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055672" comment="ldapsmb less than 1.34b-6.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055673" comment="libnetapi-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055674" comment="libnetapi0 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055675" comment="libsmbclient-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055676" comment="libsmbclient0-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055677" comment="libsmbclient0-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055678" comment="libsmbclient0 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055679" comment="libsmbsharemodes-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055680" comment="libsmbsharemodes0 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055681" comment="libtalloc-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055682" comment="libtalloc1-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055683" comment="libtalloc1-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055684" comment="libtalloc1 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055685" comment="libtdb-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055686" comment="libtdb1-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055687" comment="libtdb1-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055688" comment="libtdb1 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055689" comment="libwbclient-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055690" comment="libwbclient0-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055691" comment="libwbclient0-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055692" comment="libwbclient0 less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055693" comment="samba-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055694" comment="samba-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055695" comment="samba-client-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055696" comment="samba-client-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055697" comment="samba-client less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055698" comment="samba-devel less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055699" comment="samba-krb-printing less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055700" comment="samba-vscan less than 0.3.6b-6.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055701" comment="samba-winbind-32bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055702" comment="samba-winbind-64bit less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055703" comment="samba-winbind less than 3.2.7-11.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055704" comment="samba less than 3.2.7-11.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2949</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2949" source="CVE"/>
	<description>
	Integer overflow in the XPMReader::ReadXPM function in filter.vcl/ixpm/svt_xpmread.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to execute arbitrary code via a crafted XPM file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 9aa2fb176579b8330d78ce7638e832eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058871" comment="OpenOffice_org-base-drivers-postgresql less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058872" comment="OpenOffice_org-gnome less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058873" comment="OpenOffice_org-kde less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058874" comment="OpenOffice_org-libs-core-devel less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058875" comment="OpenOffice_org-libs-core-l10n-prebuilt less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058876" comment="OpenOffice_org-libs-core less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058877" comment="OpenOffice_org-libs-extern-devel less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058878" comment="OpenOffice_org-libs-extern-l10n-prebuilt less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058879" comment="OpenOffice_org-libs-extern less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058880" comment="OpenOffice_org-libs-gui-devel less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058881" comment="OpenOffice_org-libs-gui-l10n-prebuilt less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058882" comment="OpenOffice_org-libs-gui less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058883" comment="OpenOffice_org-mailmerge less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058884" comment="OpenOffice_org-math less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058885" comment="OpenOffice_org-writer-devel less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058886" comment="OpenOffice_org-writer-l10n-prebuilt less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058887" comment="OpenOffice_org-writer less than 3.0.0.9-2.9.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2950</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2950" source="CVE"/>
	<description>
	Heap-based buffer overflow in the GIFLZWDecompressor::GIFLZWDecompressor function in filter.vcl/lgif/decode.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted GIF file, related to LZW decompression.
	</description>
 </metadata>
<!-- 9aa2fb176579b8330d78ce7638e832eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058871" comment="OpenOffice_org-base-drivers-postgresql less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058872" comment="OpenOffice_org-gnome less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058873" comment="OpenOffice_org-kde less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058874" comment="OpenOffice_org-libs-core-devel less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058875" comment="OpenOffice_org-libs-core-l10n-prebuilt less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058876" comment="OpenOffice_org-libs-core less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058877" comment="OpenOffice_org-libs-extern-devel less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058878" comment="OpenOffice_org-libs-extern-l10n-prebuilt less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058879" comment="OpenOffice_org-libs-extern less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058880" comment="OpenOffice_org-libs-gui-devel less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058881" comment="OpenOffice_org-libs-gui-l10n-prebuilt less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058882" comment="OpenOffice_org-libs-gui less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058883" comment="OpenOffice_org-mailmerge less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058884" comment="OpenOffice_org-math less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058885" comment="OpenOffice_org-writer-devel less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058886" comment="OpenOffice_org-writer-l10n-prebuilt less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058887" comment="OpenOffice_org-writer less than 3.0.0.9-2.9.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2957</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2957" source="CVE"/>
	<description>
	Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.
	</description>
 </metadata>
<!-- eb674d821667b79bb118be56e3f659e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054838" comment="dnsmasq less than 2.45-12.16.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2958</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2958" source="CVE"/>
	<description>
	The tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a TFTP read (aka RRQ) request with a malformed blksize option.
	</description>
 </metadata>
<!-- eb674d821667b79bb118be56e3f659e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054838" comment="dnsmasq less than 2.45-12.16.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2979</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2979" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 do not properly perform XMP-XML entity expansion, which allows remote attackers to cause a denial of service via a crafted document.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2980</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2980" source="CVE"/>
	<description>
	Integer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2981</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2981" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to bypass intended Trust Manager restrictions via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2982</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2982" source="CVE"/>
	<description>
	An unspecified certificate in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow remote attackers to conduct a "social engineering attack" via unknown vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2983</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2983" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2985</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2985" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-2996.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2986</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2986" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2988</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2988" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which allows attackers to cause a denial of service via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2990</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2990" source="CVE"/>
	<description>
	Array index error in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2991</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2991" source="CVE"/>
	<description>
	Unspecified vulnerability in the Mozilla plug-in in Adobe Reader and Acrobat 8.x before 8.1.7, and possibly 7.x before 7.1.4 and 9.x before 9.2, might allow remote attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2992</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2992" source="CVE"/>
	<description>
	An unspecified ActiveX control in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 does not properly validate input, which allows attackers to cause a denial of service via unknown vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2993</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2993" source="CVE"/>
	<description>
	The JavaScript for Acrobat API in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 does not properly implement the (1) Privileged Context and (2) Safe Path restrictions for unspecified JavaScript methods, which allows remote attackers to create arbitrary files, and possibly execute arbitrary code, via the cPath parameter in a crafted PDF file.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2994</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2994" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2996</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2996" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-2985.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2997</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2997" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2998</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-2998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2998" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-3458.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3002</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3002" source="CVE"/>
	<description>
	The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.
	</description>
 </metadata>
<!-- 9005a00b713c8002f900881c513b1beb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055841" comment="kernel-debug-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055842" comment="kernel-debug-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055843" comment="kernel-debug less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055844" comment="kernel-default-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055845" comment="kernel-default-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055846" comment="kernel-default less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055847" comment="kernel-docs less than 2.6.3-3.13.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055848" comment="kernel-ec2-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055849" comment="kernel-ec2-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055850" comment="kernel-ec2 less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055851" comment="kernel-kdump less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055852" comment="kernel-pae-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055853" comment="kernel-pae-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055854" comment="kernel-pae less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055855" comment="kernel-ppc64-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055856" comment="kernel-ppc64-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055857" comment="kernel-ppc64 less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055858" comment="kernel-ps3 less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055859" comment="kernel-source less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055860" comment="kernel-syms less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055861" comment="kernel-trace-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055862" comment="kernel-trace-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055863" comment="kernel-trace less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055864" comment="kernel-vanilla less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055865" comment="kernel-xen-base less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055866" comment="kernel-xen-extra less than 2.6.27.37-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055867" comment="kernel-xen less than 2.6.27.37-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3009</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3009" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052f4a5ca0d75d7462c40199572f86b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055430" comment="rubygem-actionpack-2_1 less than 2.1.1-2.24.1"/>
	</criteria>
	<!-- af818c837162144d2587b7a2f3330290 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055433" comment="rubygem-activesupport-2_1 less than 2.1.1-2.24.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3024</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3024" source="CVE"/>
	<description>
	The verify_hostname_of_cert function in the certificate checking feature in IO-Socket-SSL (IO::Socket::SSL) 1.14 through 1.25 only matches the prefix of a hostname when no wildcard is used, which allows remote attackers to bypass the hostname check for a certificate.
	</description>
 </metadata>
<!-- 7cd44ef1605dc7d0b974adbdfa8b85b4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054809" comment="perl-IO-Socket-SSL less than 1.16-2.9.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3025</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3025" source="CVE"/>
	<description>
	Unspecified vulnerability in Pidgin 2.6.0 allows remote attackers to cause a denial of service (crash) via a link in a Yahoo IM.
	</description>
 </metadata>
<!-- 5d83b2cd58eab7e12eb8ef070639116e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056729" comment="cdparanoia-32bit less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056730" comment="cdparanoia-64bit less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056731" comment="cdparanoia less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056732" comment="cdparanoia less than IIIalpha9.8-690.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056733" comment="cdparanoia less than IIIalpha9.8-690.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056734" comment="check-32bit less than 0.9.5-63.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056735" comment="check-64bit less than 0.9.5-63.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056736" comment="check less than 0.9.5-63.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056737" comment="check less than 0.9.5-63.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056738" comment="check less than 0.9.5-63.51"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056739" comment="desktop-file-utils less than 0.15-1.113"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056740" comment="desktop-file-utils less than 0.15-1.119"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056527" comment="desktop-file-utils less than 0.15-1.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056741" comment="fam-32bit less than 2.7.0-129.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056742" comment="fam-64bit less than 2.7.0-129.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056743" comment="fam less than 2.7.0-129.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056744" comment="fam less than 2.7.0-129.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056745" comment="fam less than 2.7.0-129.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056553" comment="finch-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056554" comment="finch less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056746" comment="gnome-vfs2-32bit less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056747" comment="gnome-vfs2-lang less than 2.24.0-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056748" comment="gnome-vfs2-lang less than 2.24.0-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056749" comment="gnome-vfs2-lang less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056750" comment="gnome-vfs2 less than 2.24.0-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056751" comment="gnome-vfs2 less than 2.24.0-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056752" comment="gnome-vfs2 less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056753" comment="gstreamer-0_10-32bit less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056754" comment="gstreamer-0_10-64bit less than 0.10.21-3.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056755" comment="gstreamer-0_10-lang less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056756" comment="gstreamer-0_10-lang less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056757" comment="gstreamer-0_10-lang less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056758" comment="gstreamer-0_10 less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056759" comment="gstreamer-0_10 less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056760" comment="gstreamer-0_10 less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056761" comment="libgstreamer-0_10-0-32bit less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056762" comment="libgstreamer-0_10-0-64bit less than 0.10.21-3.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056763" comment="libgstreamer-0_10-0 less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056764" comment="libgstreamer-0_10-0 less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056765" comment="libgstreamer-0_10-0 less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056766" comment="libogg0-32bit less than 1.1.3-86.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056767" comment="libogg0-64bit less than 1.1.3-86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056768" comment="libogg0 less than 1.1.3-86.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056769" comment="libogg0 less than 1.1.3-86.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056770" comment="libogg0 less than 1.1.3-86.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056771" comment="liboil-32bit less than 0.3.15-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056772" comment="liboil-64bit less than 0.3.15-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056773" comment="liboil less than 0.3.15-1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056774" comment="liboil less than 0.3.15-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056775" comment="liboil less than 0.3.15-1.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056557" comment="libpurple-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056558" comment="libpurple-lang less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056608" comment="libpurple-meanwhile less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056609" comment="libpurple-mono less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056559" comment="libpurple less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056776" comment="libtheora0-32bit less than 1.0.beta2-3.94"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056777" comment="libtheora0 less than 1.0.beta2-3.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056778" comment="libtheora0 less than 1.0.beta2-3.94"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056779" comment="libtheora0 less than 1.0.beta2-3.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056780" comment="libvisual-32bit less than 0.4.0-174.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056781" comment="libvisual-64bit less than 0.4.0-174.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056782" comment="libvisual less than 0.4.0-174.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056783" comment="libvisual less than 0.4.0-174.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056784" comment="libvisual less than 0.4.0-174.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056785" comment="libvorbis-32bit less than 1.2.0-78.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056786" comment="libvorbis-64bit less than 1.2.0-78.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056787" comment="libvorbis less than 1.2.0-78.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056788" comment="libvorbis less than 1.2.0-78.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056789" comment="libvorbis less than 1.2.0-78.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056560" comment="pidgin-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056790" comment="pidgin-otr less than 3.2.0-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056791" comment="pidgin-otr less than 3.2.0-1.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056561" comment="pidgin less than 2.6.3-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3026</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026" source="CVE"/>
	<description>
	protocols/jabber/auth.c in libpurple in Pidgin 2.6.0, and possibly other versions, does not follow the "require TLS/SSL" preference when connecting to older Jabber servers that do not follow the XMPP specification, which causes libpurple to connect to the server without the expected encryption and allows remote attackers to sniff sessions.
	</description>
 </metadata>
<!-- 5d83b2cd58eab7e12eb8ef070639116e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056729" comment="cdparanoia-32bit less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056730" comment="cdparanoia-64bit less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056731" comment="cdparanoia less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056732" comment="cdparanoia less than IIIalpha9.8-690.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056733" comment="cdparanoia less than IIIalpha9.8-690.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056734" comment="check-32bit less than 0.9.5-63.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056735" comment="check-64bit less than 0.9.5-63.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056736" comment="check less than 0.9.5-63.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056737" comment="check less than 0.9.5-63.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056738" comment="check less than 0.9.5-63.51"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056739" comment="desktop-file-utils less than 0.15-1.113"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056740" comment="desktop-file-utils less than 0.15-1.119"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056527" comment="desktop-file-utils less than 0.15-1.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056741" comment="fam-32bit less than 2.7.0-129.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056742" comment="fam-64bit less than 2.7.0-129.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056743" comment="fam less than 2.7.0-129.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056744" comment="fam less than 2.7.0-129.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056745" comment="fam less than 2.7.0-129.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056553" comment="finch-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056554" comment="finch less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056746" comment="gnome-vfs2-32bit less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056747" comment="gnome-vfs2-lang less than 2.24.0-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056748" comment="gnome-vfs2-lang less than 2.24.0-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056749" comment="gnome-vfs2-lang less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056750" comment="gnome-vfs2 less than 2.24.0-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056751" comment="gnome-vfs2 less than 2.24.0-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056752" comment="gnome-vfs2 less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056753" comment="gstreamer-0_10-32bit less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056754" comment="gstreamer-0_10-64bit less than 0.10.21-3.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056755" comment="gstreamer-0_10-lang less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056756" comment="gstreamer-0_10-lang less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056757" comment="gstreamer-0_10-lang less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056758" comment="gstreamer-0_10 less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056759" comment="gstreamer-0_10 less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056760" comment="gstreamer-0_10 less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056761" comment="libgstreamer-0_10-0-32bit less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056762" comment="libgstreamer-0_10-0-64bit less than 0.10.21-3.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056763" comment="libgstreamer-0_10-0 less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056764" comment="libgstreamer-0_10-0 less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056765" comment="libgstreamer-0_10-0 less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056766" comment="libogg0-32bit less than 1.1.3-86.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056767" comment="libogg0-64bit less than 1.1.3-86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056768" comment="libogg0 less than 1.1.3-86.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056769" comment="libogg0 less than 1.1.3-86.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056770" comment="libogg0 less than 1.1.3-86.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056771" comment="liboil-32bit less than 0.3.15-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056772" comment="liboil-64bit less than 0.3.15-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056773" comment="liboil less than 0.3.15-1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056774" comment="liboil less than 0.3.15-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056775" comment="liboil less than 0.3.15-1.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056557" comment="libpurple-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056558" comment="libpurple-lang less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056608" comment="libpurple-meanwhile less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056609" comment="libpurple-mono less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056559" comment="libpurple less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056776" comment="libtheora0-32bit less than 1.0.beta2-3.94"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056777" comment="libtheora0 less than 1.0.beta2-3.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056778" comment="libtheora0 less than 1.0.beta2-3.94"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056779" comment="libtheora0 less than 1.0.beta2-3.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056780" comment="libvisual-32bit less than 0.4.0-174.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056781" comment="libvisual-64bit less than 0.4.0-174.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056782" comment="libvisual less than 0.4.0-174.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056783" comment="libvisual less than 0.4.0-174.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056784" comment="libvisual less than 0.4.0-174.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056785" comment="libvorbis-32bit less than 1.2.0-78.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056786" comment="libvorbis-64bit less than 1.2.0-78.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056787" comment="libvorbis less than 1.2.0-78.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056788" comment="libvorbis less than 1.2.0-78.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056789" comment="libvorbis less than 1.2.0-78.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056560" comment="pidgin-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056790" comment="pidgin-otr less than 3.2.0-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056791" comment="pidgin-otr less than 3.2.0-1.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056561" comment="pidgin less than 2.6.3-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3050</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3050" source="CVE"/>
	<description>
	Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment.  NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries.
	</description>
 </metadata>
<!-- e8eafd36af71a1d8611b06837754705e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056914" comment="htmldoc less than 1.8.27-1.114.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3051</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3051" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in lib/silcclient/client_entry.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10, and SILC Client before 1.1.8, allow remote attackers to execute arbitrary code via format string specifiers in a nickname field, related to the (1) silc_client_add_client, (2) silc_client_update_client, and (3) silc_client_nickname_format functions.
	</description>
 </metadata>
<!-- a1d993f6a0398f2c0b4e0ce65a7cf70e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054846" comment="silc-toolkit-devel less than 1.1.7-7.66.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054847" comment="silc-toolkit less than 1.1.7-7.66.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3069</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3069" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 107f71ab8766bda160f93900e02dfa78 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054985" comment="MozillaFirefox-branding-upstream less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054986" comment="MozillaFirefox-translations less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054987" comment="MozillaFirefox less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054988" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054989" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054990" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054991" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054992" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054993" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054994" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054995" comment="python-xpcom190 less than 1.9.0.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3070</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 107f71ab8766bda160f93900e02dfa78 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054985" comment="MozillaFirefox-branding-upstream less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054986" comment="MozillaFirefox-translations less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054987" comment="MozillaFirefox less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054988" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054989" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054990" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054991" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054992" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054993" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054994" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054995" comment="python-xpcom190 less than 1.9.0.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3071</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 107f71ab8766bda160f93900e02dfa78 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054985" comment="MozillaFirefox-branding-upstream less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054986" comment="MozillaFirefox-translations less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054987" comment="MozillaFirefox less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054988" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054989" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054990" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054991" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054992" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054993" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054994" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054995" comment="python-xpcom190 less than 1.9.0.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3072</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 107f71ab8766bda160f93900e02dfa78 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054985" comment="MozillaFirefox-branding-upstream less than 3.0.14-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054986" comment="MozillaFirefox-translations less than 3.0.14-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054987" comment="MozillaFirefox less than 3.0.14-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054988" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054989" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054990" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054991" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054992" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054993" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054994" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054995" comment="python-xpcom190 less than 1.9.0.14-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 3911462b3f68f3f2a965113f5b360cd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059214" comment="MozillaThunderbird-devel less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059215" comment="MozillaThunderbird-translations less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059216" comment="MozillaThunderbird less than 2.0.0.24-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 905ae89bbd71f145a4b2ab6acdd1d659 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060701" comment="seamonkey-dom-inspector less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060702" comment="seamonkey-irc less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060703" comment="seamonkey-mail less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060704" comment="seamonkey-spellchecker less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060705" comment="seamonkey-venkman less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060706" comment="seamonkey less than 1.1.19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3073</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3073" source="CVE"/>
	<description>
	Unspecified vulnerability in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 107f71ab8766bda160f93900e02dfa78 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054985" comment="MozillaFirefox-branding-upstream less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054986" comment="MozillaFirefox-translations less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054987" comment="MozillaFirefox less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054988" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054989" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054990" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054991" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054992" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054993" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054994" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054995" comment="python-xpcom190 less than 1.9.0.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3075</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 107f71ab8766bda160f93900e02dfa78 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054985" comment="MozillaFirefox-branding-upstream less than 3.0.14-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054986" comment="MozillaFirefox-translations less than 3.0.14-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054987" comment="MozillaFirefox less than 3.0.14-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054988" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054989" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054990" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054991" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054992" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054993" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054994" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054995" comment="python-xpcom190 less than 1.9.0.14-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 3911462b3f68f3f2a965113f5b360cd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059214" comment="MozillaThunderbird-devel less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059215" comment="MozillaThunderbird-translations less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059216" comment="MozillaThunderbird less than 2.0.0.24-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 905ae89bbd71f145a4b2ab6acdd1d659 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060701" comment="seamonkey-dom-inspector less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060702" comment="seamonkey-irc less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060703" comment="seamonkey-mail less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060704" comment="seamonkey-spellchecker less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060705" comment="seamonkey-venkman less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060706" comment="seamonkey less than 1.1.19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3076</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.14 does not properly implement certain dialogs associated with the (1) pkcs11.addmodule and (2) pkcs11.deletemodule operations, which makes it easier for remote attackers to trick a user into installing or removing an arbitrary PKCS11 module.
	</description>
 </metadata>
<!-- 107f71ab8766bda160f93900e02dfa78 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054985" comment="MozillaFirefox-branding-upstream less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054986" comment="MozillaFirefox-translations less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054987" comment="MozillaFirefox less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054988" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054989" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054990" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054991" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054992" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054993" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054994" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054995" comment="python-xpcom190 less than 1.9.0.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3077</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 107f71ab8766bda160f93900e02dfa78 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054985" comment="MozillaFirefox-branding-upstream less than 3.0.14-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054986" comment="MozillaFirefox-translations less than 3.0.14-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054987" comment="MozillaFirefox less than 3.0.14-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054988" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054989" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054990" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054991" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054992" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054993" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054994" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054995" comment="python-xpcom190 less than 1.9.0.14-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 3911462b3f68f3f2a965113f5b360cd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059214" comment="MozillaThunderbird-devel less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059215" comment="MozillaThunderbird-translations less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059216" comment="MozillaThunderbird less than 2.0.0.24-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 905ae89bbd71f145a4b2ab6acdd1d659 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060701" comment="seamonkey-dom-inspector less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060702" comment="seamonkey-irc less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060703" comment="seamonkey-mail less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060704" comment="seamonkey-spellchecker less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060705" comment="seamonkey-venkman less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060706" comment="seamonkey less than 1.1.19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3078</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078" source="CVE"/>
	<description>
	Visual truncation vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to trigger a vertical scroll and spoof URLs via unspecified Unicode characters with a tall line-height property.
	</description>
 </metadata>
<!-- 107f71ab8766bda160f93900e02dfa78 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054985" comment="MozillaFirefox-branding-upstream less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054986" comment="MozillaFirefox-translations less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054987" comment="MozillaFirefox less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054988" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054989" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054990" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054991" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054992" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054993" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054994" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054995" comment="python-xpcom190 less than 1.9.0.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3079</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to execute arbitrary JavaScript with chrome privileges via vectors involving an object, the FeedWriter, and the BrowserFeedWriter.
	</description>
 </metadata>
<!-- 107f71ab8766bda160f93900e02dfa78 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054985" comment="MozillaFirefox-branding-upstream less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054986" comment="MozillaFirefox-translations less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054987" comment="MozillaFirefox less than 3.0.14-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054988" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054989" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054990" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054991" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054992" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054993" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054994" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054995" comment="python-xpcom190 less than 1.9.0.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3080</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3080" source="CVE"/>
	<description>
	Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.
	</description>
 </metadata>
<!-- 3830bdefa112876096e97d7864937bc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057211" comment="kernel-debug-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057212" comment="kernel-debug-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057213" comment="kernel-debug less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057214" comment="kernel-default-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057215" comment="kernel-default-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057216" comment="kernel-default less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057217" comment="kernel-docs less than 2.6.3-3.13.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057218" comment="kernel-kdump less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057219" comment="kernel-pae-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057220" comment="kernel-pae-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057221" comment="kernel-pae less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057222" comment="kernel-ppc64-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057223" comment="kernel-ppc64-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057224" comment="kernel-ppc64 less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057225" comment="kernel-ps3 less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057226" comment="kernel-source less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057227" comment="kernel-syms less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057228" comment="kernel-trace-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057229" comment="kernel-trace-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057230" comment="kernel-trace less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057231" comment="kernel-vanilla less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057232" comment="kernel-xen-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057233" comment="kernel-xen-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057234" comment="kernel-xen less than 2.6.27.42-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3083</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3083" source="CVE"/>
	<description>
	The msn_slp_sip_recv function in libpurple/protocols/msn/slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an SLP invite message that lacks certain required fields, as demonstrated by a malformed message from a KMess client.
	</description>
 </metadata>
<!-- 5d83b2cd58eab7e12eb8ef070639116e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056729" comment="cdparanoia-32bit less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056730" comment="cdparanoia-64bit less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056731" comment="cdparanoia less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056732" comment="cdparanoia less than IIIalpha9.8-690.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056733" comment="cdparanoia less than IIIalpha9.8-690.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056734" comment="check-32bit less than 0.9.5-63.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056735" comment="check-64bit less than 0.9.5-63.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056736" comment="check less than 0.9.5-63.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056737" comment="check less than 0.9.5-63.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056738" comment="check less than 0.9.5-63.51"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056739" comment="desktop-file-utils less than 0.15-1.113"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056740" comment="desktop-file-utils less than 0.15-1.119"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056527" comment="desktop-file-utils less than 0.15-1.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056741" comment="fam-32bit less than 2.7.0-129.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056742" comment="fam-64bit less than 2.7.0-129.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056743" comment="fam less than 2.7.0-129.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056744" comment="fam less than 2.7.0-129.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056745" comment="fam less than 2.7.0-129.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056553" comment="finch-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056554" comment="finch less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056746" comment="gnome-vfs2-32bit less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056747" comment="gnome-vfs2-lang less than 2.24.0-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056748" comment="gnome-vfs2-lang less than 2.24.0-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056749" comment="gnome-vfs2-lang less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056750" comment="gnome-vfs2 less than 2.24.0-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056751" comment="gnome-vfs2 less than 2.24.0-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056752" comment="gnome-vfs2 less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056753" comment="gstreamer-0_10-32bit less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056754" comment="gstreamer-0_10-64bit less than 0.10.21-3.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056755" comment="gstreamer-0_10-lang less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056756" comment="gstreamer-0_10-lang less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056757" comment="gstreamer-0_10-lang less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056758" comment="gstreamer-0_10 less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056759" comment="gstreamer-0_10 less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056760" comment="gstreamer-0_10 less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056761" comment="libgstreamer-0_10-0-32bit less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056762" comment="libgstreamer-0_10-0-64bit less than 0.10.21-3.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056763" comment="libgstreamer-0_10-0 less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056764" comment="libgstreamer-0_10-0 less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056765" comment="libgstreamer-0_10-0 less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056766" comment="libogg0-32bit less than 1.1.3-86.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056767" comment="libogg0-64bit less than 1.1.3-86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056768" comment="libogg0 less than 1.1.3-86.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056769" comment="libogg0 less than 1.1.3-86.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056770" comment="libogg0 less than 1.1.3-86.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056771" comment="liboil-32bit less than 0.3.15-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056772" comment="liboil-64bit less than 0.3.15-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056773" comment="liboil less than 0.3.15-1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056774" comment="liboil less than 0.3.15-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056775" comment="liboil less than 0.3.15-1.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056557" comment="libpurple-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056558" comment="libpurple-lang less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056608" comment="libpurple-meanwhile less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056609" comment="libpurple-mono less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056559" comment="libpurple less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056776" comment="libtheora0-32bit less than 1.0.beta2-3.94"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056777" comment="libtheora0 less than 1.0.beta2-3.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056778" comment="libtheora0 less than 1.0.beta2-3.94"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056779" comment="libtheora0 less than 1.0.beta2-3.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056780" comment="libvisual-32bit less than 0.4.0-174.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056781" comment="libvisual-64bit less than 0.4.0-174.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056782" comment="libvisual less than 0.4.0-174.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056783" comment="libvisual less than 0.4.0-174.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056784" comment="libvisual less than 0.4.0-174.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056785" comment="libvorbis-32bit less than 1.2.0-78.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056786" comment="libvorbis-64bit less than 1.2.0-78.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056787" comment="libvorbis less than 1.2.0-78.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056788" comment="libvorbis less than 1.2.0-78.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056789" comment="libvorbis less than 1.2.0-78.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056560" comment="pidgin-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056790" comment="pidgin-otr less than 3.2.0-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056791" comment="pidgin-otr less than 3.2.0-1.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056561" comment="pidgin less than 2.6.3-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3084</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3084" source="CVE"/>
	<description>
	The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect "UTF16-LE" charset name.
	</description>
 </metadata>
<!-- 5d83b2cd58eab7e12eb8ef070639116e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056729" comment="cdparanoia-32bit less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056730" comment="cdparanoia-64bit less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056731" comment="cdparanoia less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056732" comment="cdparanoia less than IIIalpha9.8-690.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056733" comment="cdparanoia less than IIIalpha9.8-690.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056734" comment="check-32bit less than 0.9.5-63.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056735" comment="check-64bit less than 0.9.5-63.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056736" comment="check less than 0.9.5-63.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056737" comment="check less than 0.9.5-63.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056738" comment="check less than 0.9.5-63.51"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056739" comment="desktop-file-utils less than 0.15-1.113"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056740" comment="desktop-file-utils less than 0.15-1.119"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056527" comment="desktop-file-utils less than 0.15-1.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056741" comment="fam-32bit less than 2.7.0-129.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056742" comment="fam-64bit less than 2.7.0-129.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056743" comment="fam less than 2.7.0-129.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056744" comment="fam less than 2.7.0-129.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056745" comment="fam less than 2.7.0-129.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056553" comment="finch-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056554" comment="finch less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056746" comment="gnome-vfs2-32bit less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056747" comment="gnome-vfs2-lang less than 2.24.0-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056748" comment="gnome-vfs2-lang less than 2.24.0-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056749" comment="gnome-vfs2-lang less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056750" comment="gnome-vfs2 less than 2.24.0-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056751" comment="gnome-vfs2 less than 2.24.0-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056752" comment="gnome-vfs2 less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056753" comment="gstreamer-0_10-32bit less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056754" comment="gstreamer-0_10-64bit less than 0.10.21-3.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056755" comment="gstreamer-0_10-lang less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056756" comment="gstreamer-0_10-lang less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056757" comment="gstreamer-0_10-lang less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056758" comment="gstreamer-0_10 less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056759" comment="gstreamer-0_10 less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056760" comment="gstreamer-0_10 less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056761" comment="libgstreamer-0_10-0-32bit less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056762" comment="libgstreamer-0_10-0-64bit less than 0.10.21-3.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056763" comment="libgstreamer-0_10-0 less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056764" comment="libgstreamer-0_10-0 less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056765" comment="libgstreamer-0_10-0 less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056766" comment="libogg0-32bit less than 1.1.3-86.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056767" comment="libogg0-64bit less than 1.1.3-86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056768" comment="libogg0 less than 1.1.3-86.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056769" comment="libogg0 less than 1.1.3-86.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056770" comment="libogg0 less than 1.1.3-86.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056771" comment="liboil-32bit less than 0.3.15-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056772" comment="liboil-64bit less than 0.3.15-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056773" comment="liboil less than 0.3.15-1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056774" comment="liboil less than 0.3.15-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056775" comment="liboil less than 0.3.15-1.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056557" comment="libpurple-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056558" comment="libpurple-lang less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056608" comment="libpurple-meanwhile less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056609" comment="libpurple-mono less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056559" comment="libpurple less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056776" comment="libtheora0-32bit less than 1.0.beta2-3.94"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056777" comment="libtheora0 less than 1.0.beta2-3.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056778" comment="libtheora0 less than 1.0.beta2-3.94"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056779" comment="libtheora0 less than 1.0.beta2-3.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056780" comment="libvisual-32bit less than 0.4.0-174.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056781" comment="libvisual-64bit less than 0.4.0-174.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056782" comment="libvisual less than 0.4.0-174.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056783" comment="libvisual less than 0.4.0-174.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056784" comment="libvisual less than 0.4.0-174.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056785" comment="libvorbis-32bit less than 1.2.0-78.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056786" comment="libvorbis-64bit less than 1.2.0-78.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056787" comment="libvorbis less than 1.2.0-78.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056788" comment="libvorbis less than 1.2.0-78.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056789" comment="libvorbis less than 1.2.0-78.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056560" comment="pidgin-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056790" comment="pidgin-otr less than 3.2.0-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056791" comment="pidgin-otr less than 3.2.0-1.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056561" comment="pidgin less than 2.6.3-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3085</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3085" source="CVE"/>
	<description>
	The XMPP protocol plugin in libpurple in Pidgin before 2.6.2 does not properly handle an error IQ stanza during an attempted fetch of a custom smiley, which allows remote attackers to cause a denial of service (application crash) via XHTML-IM content with cid: images.
	</description>
 </metadata>
<!-- 5d83b2cd58eab7e12eb8ef070639116e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056729" comment="cdparanoia-32bit less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056730" comment="cdparanoia-64bit less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056731" comment="cdparanoia less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056732" comment="cdparanoia less than IIIalpha9.8-690.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056733" comment="cdparanoia less than IIIalpha9.8-690.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056734" comment="check-32bit less than 0.9.5-63.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056735" comment="check-64bit less than 0.9.5-63.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056736" comment="check less than 0.9.5-63.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056737" comment="check less than 0.9.5-63.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056738" comment="check less than 0.9.5-63.51"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056739" comment="desktop-file-utils less than 0.15-1.113"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056740" comment="desktop-file-utils less than 0.15-1.119"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056527" comment="desktop-file-utils less than 0.15-1.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056741" comment="fam-32bit less than 2.7.0-129.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056742" comment="fam-64bit less than 2.7.0-129.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056743" comment="fam less than 2.7.0-129.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056744" comment="fam less than 2.7.0-129.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056745" comment="fam less than 2.7.0-129.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056553" comment="finch-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056554" comment="finch less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056746" comment="gnome-vfs2-32bit less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056747" comment="gnome-vfs2-lang less than 2.24.0-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056748" comment="gnome-vfs2-lang less than 2.24.0-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056749" comment="gnome-vfs2-lang less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056750" comment="gnome-vfs2 less than 2.24.0-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056751" comment="gnome-vfs2 less than 2.24.0-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056752" comment="gnome-vfs2 less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056753" comment="gstreamer-0_10-32bit less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056754" comment="gstreamer-0_10-64bit less than 0.10.21-3.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056755" comment="gstreamer-0_10-lang less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056756" comment="gstreamer-0_10-lang less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056757" comment="gstreamer-0_10-lang less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056758" comment="gstreamer-0_10 less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056759" comment="gstreamer-0_10 less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056760" comment="gstreamer-0_10 less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056761" comment="libgstreamer-0_10-0-32bit less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056762" comment="libgstreamer-0_10-0-64bit less than 0.10.21-3.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056763" comment="libgstreamer-0_10-0 less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056764" comment="libgstreamer-0_10-0 less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056765" comment="libgstreamer-0_10-0 less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056766" comment="libogg0-32bit less than 1.1.3-86.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056767" comment="libogg0-64bit less than 1.1.3-86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056768" comment="libogg0 less than 1.1.3-86.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056769" comment="libogg0 less than 1.1.3-86.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056770" comment="libogg0 less than 1.1.3-86.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056771" comment="liboil-32bit less than 0.3.15-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056772" comment="liboil-64bit less than 0.3.15-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056773" comment="liboil less than 0.3.15-1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056774" comment="liboil less than 0.3.15-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056775" comment="liboil less than 0.3.15-1.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056557" comment="libpurple-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056558" comment="libpurple-lang less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056608" comment="libpurple-meanwhile less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056609" comment="libpurple-mono less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056559" comment="libpurple less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056776" comment="libtheora0-32bit less than 1.0.beta2-3.94"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056777" comment="libtheora0 less than 1.0.beta2-3.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056778" comment="libtheora0 less than 1.0.beta2-3.94"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056779" comment="libtheora0 less than 1.0.beta2-3.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056780" comment="libvisual-32bit less than 0.4.0-174.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056781" comment="libvisual-64bit less than 0.4.0-174.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056782" comment="libvisual less than 0.4.0-174.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056783" comment="libvisual less than 0.4.0-174.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056784" comment="libvisual less than 0.4.0-174.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056785" comment="libvorbis-32bit less than 1.2.0-78.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056786" comment="libvorbis-64bit less than 1.2.0-78.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056787" comment="libvorbis less than 1.2.0-78.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056788" comment="libvorbis less than 1.2.0-78.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056789" comment="libvorbis less than 1.2.0-78.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056560" comment="pidgin-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056790" comment="pidgin-otr less than 3.2.0-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056791" comment="pidgin-otr less than 3.2.0-1.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056561" comment="pidgin less than 2.6.3-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3086</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3086" source="CVE"/>
	<description>
	A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052f4a5ca0d75d7462c40199572f86b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055430" comment="rubygem-actionpack-2_1 less than 2.1.1-2.24.1"/>
	</criteria>
	<!-- af818c837162144d2587b7a2f3330290 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055433" comment="rubygem-activesupport-2_1 less than 2.1.1-2.24.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3094</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094" source="CVE"/>
	<description>
	The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
	</description>
 </metadata>
<!-- 0683ec2df667efa4b179f003d0da49d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055738" comment="apache2-devel less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055739" comment="apache2-doc less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055740" comment="apache2-example-pages less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055741" comment="apache2-prefork less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055742" comment="apache2-utils less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055743" comment="apache2-worker less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055744" comment="apache2 less than 2.2.10-2.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3095</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095" source="CVE"/>
	<description>
	The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
	</description>
 </metadata>
<!-- 0683ec2df667efa4b179f003d0da49d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055738" comment="apache2-devel less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055739" comment="apache2-doc less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055740" comment="apache2-example-pages less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055741" comment="apache2-prefork less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055742" comment="apache2-utils less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055743" comment="apache2-worker less than 2.2.10-2.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055744" comment="apache2 less than 2.2.10-2.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3229</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3229" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.4 before 8.4.1, 8.3 before 8.3.8, and 8.2 before 8.2.14 allows remote authenticated users to cause a denial of service (backend shutdown) by "re-LOAD-ing" libraries from a certain plugins directory.
	</description>
 </metadata>
<!-- 253ee9a4e425a6314b5b7ccef2446041 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055020" comment="postgresql-contrib less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055046" comment="postgresql-devel less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055021" comment="postgresql-docs less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055022" comment="postgresql-libs-32bit less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055047" comment="postgresql-libs-64bit less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055024" comment="postgresql-libs less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055025" comment="postgresql-server less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055026" comment="postgresql less than 8.3.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3230</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3230" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.4 before 8.4.1, 8.3 before 8.3.8, 8.2 before 8.2.14, 8.1 before 8.1.18, 8.0 before 8.0.22, and 7.4 before 7.4.26 does not use the appropriate privileges for the (1) RESET ROLE and (2) RESET SESSION AUTHORIZATION operations, which allows remote authenticated users to gain privileges.  NOTE: this is due to an incomplete fix for CVE-2007-6600.
	</description>
 </metadata>
<!-- 253ee9a4e425a6314b5b7ccef2446041 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055020" comment="postgresql-contrib less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055046" comment="postgresql-devel less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055021" comment="postgresql-docs less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055022" comment="postgresql-libs-32bit less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055047" comment="postgresql-libs-64bit less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055024" comment="postgresql-libs less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055025" comment="postgresql-server less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055026" comment="postgresql less than 8.3.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3231</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3231" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.3 before 8.3.8 and 8.2 before 8.2.14, when using LDAP authentication with anonymous binds, allows remote attackers to bypass authentication via an empty password.
	</description>
 </metadata>
<!-- 253ee9a4e425a6314b5b7ccef2446041 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055020" comment="postgresql-contrib less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055046" comment="postgresql-devel less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055021" comment="postgresql-docs less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055022" comment="postgresql-libs-32bit less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055047" comment="postgresql-libs-64bit less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055024" comment="postgresql-libs less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055025" comment="postgresql-server less than 8.3.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055026" comment="postgresql less than 8.3.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3235</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3235" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4c6fb0616c0f857515d6214e8a743afd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055139" comment="dovecot11-backend-mysql less than 1.1.7-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055140" comment="dovecot11-backend-pgsql less than 1.1.7-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055141" comment="dovecot11-backend-sqlite less than 1.1.7-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055142" comment="dovecot11-devel less than 1.1.7-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055143" comment="dovecot11-fts-lucene less than 1.1.7-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055144" comment="dovecot11 less than 1.1.7-1.4.1"/>
		</criteria>
	</criteria>
	<!-- 6a147d729df4754488d44340b45cae21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055816" comment="cyrus-imapd-devel less than 2.3.11-60.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055776" comment="cyrus-imapd less than 2.3.11-60.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055777" comment="perl-Cyrus-IMAP less than 2.3.11-60.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055778" comment="perl-Cyrus-SIEVE-managesieve less than 2.3.11-60.21.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3241</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241" source="CVE"/>
	<description>
	Unspecified vulnerability in the OpcUa (OPC UA) dissector in Wireshark 0.99.6 through 1.0.8 and 1.2.0 through 1.2.1 allows remote attackers to cause a denial of service (memory and CPU consumption) via malformed OPCUA Service CallRequest packets.
	</description>
 </metadata>
<!-- 8def5011086b2f9a79a320097ee88f79 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055133" comment="wireshark-devel less than 1.0.4-2.11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055134" comment="wireshark less than 1.0.4-2.11.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3245</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3245" source="CVE"/>
	<description>
	OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.
	</description>
 </metadata>
<!-- 470d54b3be4e369bbde36bf7ae7fa6ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059339" comment="libopenssl-devel less than 0.9.8h-28.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059340" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059341" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059342" comment="libopenssl0_9_8 less than 0.9.8h-28.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059343" comment="openssl-certs less than 0.9.8h-25.2.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059344" comment="openssl-doc less than 0.9.8h-28.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059345" comment="openssl less than 0.9.8h-28.15.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3265</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3265" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Opera 9 and 10 allows remote attackers to inject arbitrary web script or HTML via a (1) RSS or (2) Atom feed, related to the rendering of the application/rss+xml content type as "scripted content." NOTE: the vendor reportedly considers this behavior a "design feature," not a vulnerability.
	</description>
 </metadata>
<!-- c9f84e41a039525ebc68632da6edb55a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056091" comment="opera less than 10.01-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3266</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3266" source="CVE"/>
	<description>
	Opera before 10.01 does not properly restrict HTML in a (1) RSS or (2) Atom feed, which allows remote attackers to conduct cross-site scripting (XSS) attacks, and conduct cross-zone scripting attacks involving the Feed Subscription Page to read feeds or create feed subscriptions, via a crafted feed, related to the rendering of the application/rss+xml content type as "scripted content."
	</description>
 </metadata>
<!-- c9f84e41a039525ebc68632da6edb55a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056091" comment="opera less than 10.01-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3274</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274" source="CVE"/>
	<description>
	Mozilla Firefox 3.6a1, 3.5.3, 3.5.2, and earlier 3.5.x versions, and 3.0.14 and earlier 2.x and 3.x versions, on Linux uses a predictable /tmp pathname for files selected from the Downloads window, which allows local users to replace an arbitrary downloaded file by placing a file in a /tmp location before the download occurs, related to the Download Manager component. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3286</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3286" source="CVE"/>
	<description>
	NFSv4 in the Linux kernel 2.6.18, and possibly other versions, does not properly clean up an inode when an O_EXCL create fails, which causes files to be created with insecure settings such as setuid bits, and possibly allows local users to gain privileges, related to the execution of the do_open_permission function even when a create fails.
	</description>
 </metadata>
<!-- 971c806ecaf91d73fc2850362bf9f623 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056428" comment="kernel-debug-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056429" comment="kernel-debug-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056430" comment="kernel-debug less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056431" comment="kernel-default-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056432" comment="kernel-default-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056433" comment="kernel-default less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056434" comment="kernel-docs less than 2.6.3-3.13.66"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056435" comment="kernel-kdump less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056436" comment="kernel-pae-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056437" comment="kernel-pae-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056438" comment="kernel-pae less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056439" comment="kernel-ppc64-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056440" comment="kernel-ppc64-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056441" comment="kernel-ppc64 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056442" comment="kernel-ps3 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056443" comment="kernel-source less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056444" comment="kernel-syms less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056445" comment="kernel-trace-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056446" comment="kernel-trace-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056447" comment="kernel-trace less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056448" comment="kernel-vanilla less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056449" comment="kernel-xen-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056450" comment="kernel-xen-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056451" comment="kernel-xen less than 2.6.27.39-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3289</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3289" source="CVE"/>
	<description>
	The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
	</description>
 </metadata>
<!-- a9285c7ae9ffee7af90eae454cd0f1b3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059887" comment="glib2-branding-upstream less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059888" comment="glib2-devel less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059889" comment="glib2-doc less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059890" comment="glib2-lang less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059891" comment="glib2 less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059892" comment="libgio-2_0-0-32bit less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059893" comment="libgio-2_0-0-64bit less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059894" comment="libgio-2_0-0 less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059895" comment="libgio-fam less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059896" comment="libglib-2_0-0-32bit less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059897" comment="libglib-2_0-0-64bit less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059898" comment="libglib-2_0-0 less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059899" comment="libgmodule-2_0-0-32bit less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059900" comment="libgmodule-2_0-0-64bit less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059901" comment="libgmodule-2_0-0 less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059902" comment="libgobject-2_0-0-32bit less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059903" comment="libgobject-2_0-0-64bit less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059904" comment="libgobject-2_0-0 less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059905" comment="libgthread-2_0-0-32bit less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059906" comment="libgthread-2_0-0-64bit less than 2.18.2-5.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059907" comment="libgthread-2_0-0 less than 2.18.2-5.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3291</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3291" source="CVE"/>
	<description>
	The php_openssl_apply_verification_policy function in PHP before 5.2.11 does not properly perform certificate validation, which has unknown impact and attack vectors, probably related to an ability to spoof certificates.
	</description>
 </metadata>
<!-- cef8c37e542688ee2ca3e259a02c041f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055298" comment="apache2-mod_php5 less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055299" comment="php5-bcmath less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055300" comment="php5-bz2 less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055301" comment="php5-calendar less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055302" comment="php5-ctype less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055303" comment="php5-curl less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055304" comment="php5-dba less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055305" comment="php5-dbase less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055306" comment="php5-devel less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055307" comment="php5-dom less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055308" comment="php5-exif less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055309" comment="php5-fastcgi less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055310" comment="php5-ftp less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055311" comment="php5-gd less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055312" comment="php5-gettext less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055313" comment="php5-gmp less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055314" comment="php5-hash less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055315" comment="php5-iconv less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055316" comment="php5-imap less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055317" comment="php5-json less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055318" comment="php5-ldap less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055319" comment="php5-mbstring less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055320" comment="php5-mcrypt less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055321" comment="php5-mysql less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055322" comment="php5-ncurses less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055323" comment="php5-odbc less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055324" comment="php5-openssl less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055325" comment="php5-pcntl less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055326" comment="php5-pdo less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055327" comment="php5-pear less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055328" comment="php5-pgsql less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055329" comment="php5-posix less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055330" comment="php5-pspell less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055331" comment="php5-readline less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055332" comment="php5-shmop less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055333" comment="php5-snmp less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055334" comment="php5-soap less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055335" comment="php5-sockets less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055336" comment="php5-sqlite less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055337" comment="php5-suhosin less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055338" comment="php5-sysvmsg less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055339" comment="php5-sysvsem less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055340" comment="php5-sysvshm less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055341" comment="php5-tidy less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055342" comment="php5-tokenizer less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055343" comment="php5-wddx less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055344" comment="php5-xmlreader less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055345" comment="php5-xmlrpc less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055346" comment="php5-xmlwriter less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055347" comment="php5-xsl less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055348" comment="php5-zip less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055349" comment="php5-zlib less than 5.2.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3292</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3292" source="CVE"/>
	<description>
	Unspecified vulnerability in PHP before 5.2.11, and 5.3.x before 5.3.1, has unknown impact and attack vectors related to "missing sanity checks around exif processing."
	</description>
 </metadata>
<!-- cef8c37e542688ee2ca3e259a02c041f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055298" comment="apache2-mod_php5 less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055299" comment="php5-bcmath less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055300" comment="php5-bz2 less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055301" comment="php5-calendar less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055302" comment="php5-ctype less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055303" comment="php5-curl less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055304" comment="php5-dba less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055305" comment="php5-dbase less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055306" comment="php5-devel less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055307" comment="php5-dom less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055308" comment="php5-exif less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055309" comment="php5-fastcgi less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055310" comment="php5-ftp less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055311" comment="php5-gd less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055312" comment="php5-gettext less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055313" comment="php5-gmp less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055314" comment="php5-hash less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055315" comment="php5-iconv less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055316" comment="php5-imap less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055317" comment="php5-json less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055318" comment="php5-ldap less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055319" comment="php5-mbstring less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055320" comment="php5-mcrypt less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055321" comment="php5-mysql less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055322" comment="php5-ncurses less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055323" comment="php5-odbc less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055324" comment="php5-openssl less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055325" comment="php5-pcntl less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055326" comment="php5-pdo less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055327" comment="php5-pear less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055328" comment="php5-pgsql less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055329" comment="php5-posix less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055330" comment="php5-pspell less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055331" comment="php5-readline less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055332" comment="php5-shmop less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055333" comment="php5-snmp less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055334" comment="php5-soap less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055335" comment="php5-sockets less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055336" comment="php5-sqlite less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055337" comment="php5-suhosin less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055338" comment="php5-sysvmsg less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055339" comment="php5-sysvsem less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055340" comment="php5-sysvshm less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055341" comment="php5-tidy less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055342" comment="php5-tokenizer less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055343" comment="php5-wddx less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055344" comment="php5-xmlreader less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055345" comment="php5-xmlrpc less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055346" comment="php5-xmlwriter less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055347" comment="php5-xsl less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055348" comment="php5-zip less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055349" comment="php5-zlib less than 5.2.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3293</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3293" source="CVE"/>
	<description>
	Unspecified vulnerability in the imagecolortransparent function in PHP before 5.2.11 has unknown impact and attack vectors related to an incorrect "sanity check for the color index."
	</description>
 </metadata>
<!-- cef8c37e542688ee2ca3e259a02c041f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055298" comment="apache2-mod_php5 less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055299" comment="php5-bcmath less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055300" comment="php5-bz2 less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055301" comment="php5-calendar less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055302" comment="php5-ctype less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055303" comment="php5-curl less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055304" comment="php5-dba less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055305" comment="php5-dbase less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055306" comment="php5-devel less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055307" comment="php5-dom less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055308" comment="php5-exif less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055309" comment="php5-fastcgi less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055310" comment="php5-ftp less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055311" comment="php5-gd less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055312" comment="php5-gettext less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055313" comment="php5-gmp less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055314" comment="php5-hash less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055315" comment="php5-iconv less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055316" comment="php5-imap less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055317" comment="php5-json less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055318" comment="php5-ldap less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055319" comment="php5-mbstring less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055320" comment="php5-mcrypt less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055321" comment="php5-mysql less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055322" comment="php5-ncurses less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055323" comment="php5-odbc less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055324" comment="php5-openssl less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055325" comment="php5-pcntl less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055326" comment="php5-pdo less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055327" comment="php5-pear less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055328" comment="php5-pgsql less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055329" comment="php5-posix less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055330" comment="php5-pspell less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055331" comment="php5-readline less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055332" comment="php5-shmop less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055333" comment="php5-snmp less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055334" comment="php5-soap less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055335" comment="php5-sockets less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055336" comment="php5-sqlite less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055337" comment="php5-suhosin less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055338" comment="php5-sysvmsg less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055339" comment="php5-sysvsem less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055340" comment="php5-sysvshm less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055341" comment="php5-tidy less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055342" comment="php5-tokenizer less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055343" comment="php5-wddx less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055344" comment="php5-xmlreader less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055345" comment="php5-xmlrpc less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055346" comment="php5-xmlwriter less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055347" comment="php5-xsl less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055348" comment="php5-zip less than 5.2.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055349" comment="php5-zlib less than 5.2.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3295</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3295" source="CVE"/>
	<description>
	The prep_reprocess_req function in kdc/do_tgs_req.c in the cross-realm referral implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a ticket request.
	</description>
 </metadata>
<!-- c3f00622573f678ec6905accc33e53b4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057366" comment="krb5-32bit less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057367" comment="krb5-64bit less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057368" comment="krb5-apps-clients less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057369" comment="krb5-apps-servers less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057370" comment="krb5-client less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057371" comment="krb5-devel-32bit less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057372" comment="krb5-devel-64bit less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057373" comment="krb5-devel less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057374" comment="krb5-server less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057375" comment="krb5 less than 1.6.3-132.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3297</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3297" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789.  Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs.  Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 9bf97acc2fb4a3466237695b296fee3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057792" comment="fuse-devel less than 2.7.2-61.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057793" comment="fuse less than 2.7.2-61.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057794" comment="libfuse2 less than 2.7.2-61.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3301</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3301" source="CVE"/>
	<description>
	Integer underflow in filter/ww8/ww8par2.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted sprmTDefTable table property modifier in a Word document.
	</description>
 </metadata>
<!-- 9aa2fb176579b8330d78ce7638e832eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058871" comment="OpenOffice_org-base-drivers-postgresql less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058872" comment="OpenOffice_org-gnome less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058873" comment="OpenOffice_org-kde less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058874" comment="OpenOffice_org-libs-core-devel less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058875" comment="OpenOffice_org-libs-core-l10n-prebuilt less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058876" comment="OpenOffice_org-libs-core less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058877" comment="OpenOffice_org-libs-extern-devel less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058878" comment="OpenOffice_org-libs-extern-l10n-prebuilt less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058879" comment="OpenOffice_org-libs-extern less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058880" comment="OpenOffice_org-libs-gui-devel less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058881" comment="OpenOffice_org-libs-gui-l10n-prebuilt less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058882" comment="OpenOffice_org-libs-gui less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058883" comment="OpenOffice_org-mailmerge less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058884" comment="OpenOffice_org-math less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058885" comment="OpenOffice_org-writer-devel less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058886" comment="OpenOffice_org-writer-l10n-prebuilt less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058887" comment="OpenOffice_org-writer less than 3.0.0.9-2.9.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3302</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3302" source="CVE"/>
	<description>
	filter/ww8/ww8par2.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted sprmTSetBrc table property modifier in a Word document, related to a "boundary error flaw."
	</description>
 </metadata>
<!-- 9aa2fb176579b8330d78ce7638e832eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058871" comment="OpenOffice_org-base-drivers-postgresql less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058872" comment="OpenOffice_org-gnome less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058873" comment="OpenOffice_org-kde less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058874" comment="OpenOffice_org-libs-core-devel less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058875" comment="OpenOffice_org-libs-core-l10n-prebuilt less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058876" comment="OpenOffice_org-libs-core less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058877" comment="OpenOffice_org-libs-extern-devel less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058878" comment="OpenOffice_org-libs-extern-l10n-prebuilt less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058879" comment="OpenOffice_org-libs-extern less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058880" comment="OpenOffice_org-libs-gui-devel less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058881" comment="OpenOffice_org-libs-gui-l10n-prebuilt less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058882" comment="OpenOffice_org-libs-gui less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058883" comment="OpenOffice_org-mailmerge less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058884" comment="OpenOffice_org-math less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058885" comment="OpenOffice_org-writer-devel less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058886" comment="OpenOffice_org-writer-l10n-prebuilt less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058887" comment="OpenOffice_org-writer less than 3.0.0.9-2.9.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3370</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3370" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.15, and 3.5.x before 3.5.4, allows remote attackers to read form history by forging mouse and keyboard events that leverage the auto-fill feature to populate form fields, in an attacker-readable form, with history entries.
	</description>
 </metadata>
<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3371</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3371" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by creating JavaScript web-workers recursively.
	</description>
 </metadata>
<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3372</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via a crafted regular expression in a Proxy Auto-configuration (PAC) file.
	</description>
 </metadata>
<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3373</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373" source="CVE"/>
	<description>
	Heap-based buffer overflow in the GIF image parser in Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3374</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3374" source="CVE"/>
	<description>
	The XPCVariant::VariantDataToJS function in the XPCOM implementation in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 does not enforce intended restrictions on interaction between chrome privileged code and objects obtained from remote web sites, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via unspecified method calls, related to "doubly-wrapped objects."
	</description>
 </metadata>
<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3375</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3375" source="CVE"/>
	<description>
	content/html/document/src/nsHTMLDocument.cpp in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allows user-assisted remote attackers to bypass the Same Origin Policy and read an arbitrary content selection via the document.getSelection function.
	</description>
 </metadata>
<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3376</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
		</criteria>
	</criteria>
	<!-- 3911462b3f68f3f2a965113f5b360cd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059214" comment="MozillaThunderbird-devel less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059215" comment="MozillaThunderbird-translations less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059216" comment="MozillaThunderbird less than 2.0.0.24-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 905ae89bbd71f145a4b2ab6acdd1d659 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060701" comment="seamonkey-dom-inspector less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060702" comment="seamonkey-irc less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060703" comment="seamonkey-mail less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060704" comment="seamonkey-spellchecker less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060705" comment="seamonkey-venkman less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060706" comment="seamonkey less than 1.1.19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3380</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3381</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3381" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3382</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3382" source="CVE"/>
	<description>
	layout/base/nsCSSFrameConstructor.cpp in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 does not properly handle first-letter frames, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3383</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3383" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 26d6caf01ce1bc1bd09adac2dd4b1e66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056047" comment="MozillaFirefox-branding-upstream less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056048" comment="MozillaFirefox-translations less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056049" comment="MozillaFirefox less than 3.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055940" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055952" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055953" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055941" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055955" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055942" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055944" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056050" comment="python-xpcom190 less than 1.9.0.15-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3385</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3385" source="CVE"/>
	<description>
	The mail component in Mozilla SeaMonkey before 1.1.19 does not properly restrict execution of scriptable plugin content, which allows user-assisted remote attackers to obtain sensitive information via crafted content in an IFRAME element in an HTML e-mail message, as demonstrated by a Flash object that sends arbitrary local files during a reply or forward operation.
	</description>
 </metadata>
<!-- 905ae89bbd71f145a4b2ab6acdd1d659 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060701" comment="seamonkey-dom-inspector less than 1.1.19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060702" comment="seamonkey-irc less than 1.1.19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060703" comment="seamonkey-mail less than 1.1.19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060704" comment="seamonkey-spellchecker less than 1.1.19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060705" comment="seamonkey-venkman less than 1.1.19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060706" comment="seamonkey less than 1.1.19-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3389</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3389" source="CVE"/>
	<description>
	Integer overflow in libtheora in Xiph.Org Theora before 1.1, as used in Mozilla Firefox 3.5 before 3.5.6 and SeaMonkey before 2.0.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a video with large dimensions.
	</description>
 </metadata>
<!-- ae6dc5fb8a3bf26b02f4bbb5ea5d37df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059351" comment="libtheora-devel less than 1.0.beta2-3.97.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059352" comment="libtheora0-32bit less than 1.0.beta2-3.97.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059353" comment="libtheora0 less than 1.0.beta2-3.97.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3431</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3431" source="CVE"/>
	<description>
	Stack consumption vulnerability in Adobe Reader and Acrobat 9.1.3, 9.1.2, 9.1.1, and earlier 9.x versions; 8.1.6 and earlier 8.x versions; and possibly 7.1.4 and earlier 7.x versions allows remote attackers to cause a denial of service (application crash) via a PDF file with a large number of [ (open square bracket) characters in the argument to the alert method. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3458</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3458" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-2998.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3459</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3459" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3462</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3462" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 on Unix, when Debug mode is enabled, allow attackers to execute arbitrary code via unspecified vectors, related to a "format bug."
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3525</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3525" source="CVE"/>
	<description>
	The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest's kernel boot parameters without providing the expected password.
	</description>
 </metadata>
<!-- 622e065f1a6df2937582245caa54a2a4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060727" comment="libcmpiutil-devel less than 0.5-15.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060728" comment="libcmpiutil less than 0.5-15.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060729" comment="libvirt-cim less than 0.5.2-4.22.92"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060730" comment="libvirt-devel less than 0.4.6-11.16.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060731" comment="libvirt-doc less than 0.4.6-11.16.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060732" comment="libvirt-python less than 0.4.6-11.16.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060733" comment="libvirt less than 0.4.6-11.16.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060734" comment="virt-manager less than 0.5.3-64.26.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060735" comment="virt-viewer less than 0.0.3-3.30.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060736" comment="vm-install less than 0.3.27-0.1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060737" comment="xen-devel less than 3.3.1_18546_24-0.4.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060738" comment="xen-doc-html less than 3.3.1_18546_24-0.4.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060739" comment="xen-doc-pdf less than 3.3.1_18546_24-0.4.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060740" comment="xen-kmp-debug less than 3.3.1_18546_24_2.6.27.45_0.2-0.4.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060741" comment="xen-kmp-default less than 3.3.1_18546_24_2.6.27.45_0.2-0.4.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060742" comment="xen-kmp-pae less than 3.3.1_18546_24_2.6.27.45_0.2-0.4.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060743" comment="xen-kmp-trace less than 3.3.1_18546_24_2.6.27.45_0.2-0.4.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060744" comment="xen-libs-32bit less than 3.3.1_18546_24-0.4.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060745" comment="xen-libs less than 3.3.1_18546_24-0.4.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060746" comment="xen-tools-domU less than 3.3.1_18546_24-0.4.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060747" comment="xen-tools less than 3.3.1_18546_24-0.4.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060748" comment="xen less than 3.3.1_18546_24-0.4.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3546</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546" source="CVE"/>
	<description>
	The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 051e60b1cd753810bd1e57e8fa1e5d07 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058185" comment="apache2-mod_php5 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058186" comment="php5-bcmath less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058187" comment="php5-bz2 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058188" comment="php5-calendar less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058189" comment="php5-ctype less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058190" comment="php5-curl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058191" comment="php5-dba less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058192" comment="php5-dbase less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058193" comment="php5-devel less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058194" comment="php5-dom less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058195" comment="php5-exif less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058196" comment="php5-fastcgi less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058197" comment="php5-ftp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058198" comment="php5-gd less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058199" comment="php5-gettext less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058200" comment="php5-gmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058201" comment="php5-hash less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058202" comment="php5-iconv less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058203" comment="php5-imap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058204" comment="php5-json less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058205" comment="php5-ldap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058206" comment="php5-mbstring less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058207" comment="php5-mcrypt less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058208" comment="php5-mysql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058209" comment="php5-ncurses less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058210" comment="php5-odbc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058211" comment="php5-openssl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058212" comment="php5-pcntl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058213" comment="php5-pdo less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058214" comment="php5-pear less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058215" comment="php5-pgsql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058216" comment="php5-posix less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058217" comment="php5-pspell less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058218" comment="php5-readline less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058219" comment="php5-shmop less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058220" comment="php5-snmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058221" comment="php5-soap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058222" comment="php5-sockets less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058223" comment="php5-sqlite less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058224" comment="php5-suhosin less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058225" comment="php5-sysvmsg less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058226" comment="php5-sysvsem less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058227" comment="php5-sysvshm less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058228" comment="php5-tidy less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058229" comment="php5-tokenizer less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058230" comment="php5-wddx less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058231" comment="php5-xmlreader less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058232" comment="php5-xmlrpc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058233" comment="php5-xmlwriter less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058234" comment="php5-xsl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058235" comment="php5-zip less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058236" comment="php5-zlib less than 5.2.12-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3547</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547" source="CVE"/>
	<description>
	Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.
	</description>
 </metadata>
<!-- 971c806ecaf91d73fc2850362bf9f623 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056428" comment="kernel-debug-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056429" comment="kernel-debug-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056430" comment="kernel-debug less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056431" comment="kernel-default-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056432" comment="kernel-default-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056433" comment="kernel-default less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056434" comment="kernel-docs less than 2.6.3-3.13.66"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056435" comment="kernel-kdump less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056436" comment="kernel-pae-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056437" comment="kernel-pae-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056438" comment="kernel-pae less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056439" comment="kernel-ppc64-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056440" comment="kernel-ppc64-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056441" comment="kernel-ppc64 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056442" comment="kernel-ps3 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056443" comment="kernel-source less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056444" comment="kernel-syms less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056445" comment="kernel-trace-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056446" comment="kernel-trace-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056447" comment="kernel-trace less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056448" comment="kernel-vanilla less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056449" comment="kernel-xen-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056450" comment="kernel-xen-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056451" comment="kernel-xen less than 2.6.27.39-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3549</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3549" source="CVE"/>
	<description>
	packet-paltalk.c in the Paltalk dissector in Wireshark 1.2.0 through 1.2.2, on SPARC and certain other platforms, allows remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace.
	</description>
 </metadata>
<!-- 8e08d9b8b625bc9fb7365a4b7e6d2187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056456" comment="wireshark-devel less than 1.0.4-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056457" comment="wireshark less than 1.0.4-2.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3550</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550" source="CVE"/>
	<description>
	The DCERPC/NT dissector in Wireshark 0.10.10 through 1.0.9 and 1.2.0 through 1.2.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a file that records a malformed packet trace.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 8e08d9b8b625bc9fb7365a4b7e6d2187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056456" comment="wireshark-devel less than 1.0.4-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056457" comment="wireshark less than 1.0.4-2.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3551</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3551" source="CVE"/>
	<description>
	Off-by-one error in the dissect_negprot_response function in packet-smb.c in the SMB dissector in Wireshark 1.2.0 through 1.2.2 allows remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 8e08d9b8b625bc9fb7365a4b7e6d2187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056456" comment="wireshark-devel less than 1.0.4-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056457" comment="wireshark less than 1.0.4-2.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3553</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553" source="CVE"/>
	<description>
	Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2577fb5e65d1c094e757eaa7a73b0543 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057036" comment="cups-client less than 1.3.9-7.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057037" comment="cups-devel less than 1.3.9-7.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057038" comment="cups-libs-32bit less than 1.3.9-7.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057039" comment="cups-libs-64bit less than 1.3.9-7.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057040" comment="cups-libs less than 1.3.9-7.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057041" comment="cups less than 1.3.9-7.6.1"/>
		</criteria>
	</criteria>
	<!-- e1ef8955282f1a32cf0d3c4a50d75a32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059005" comment="cups-client less than 1.3.9-7.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059006" comment="cups-devel less than 1.3.9-7.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059007" comment="cups-libs-32bit less than 1.3.9-7.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059008" comment="cups-libs-64bit less than 1.3.9-7.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059009" comment="cups-libs less than 1.3.9-7.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059010" comment="cups less than 1.3.9-7.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3555</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" source="CVE"/>
	<description>
	The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 00569126168069617e8dcf9d7e3abc78 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059415" comment="libfreebl3-32bit less than 3.12.6-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059547" comment="libfreebl3-64bit less than 3.12.6-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059417" comment="libfreebl3 less than 3.12.6-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059418" comment="mozilla-nss-32bit less than 3.12.6-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059548" comment="mozilla-nss-64bit less than 3.12.6-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059431" comment="mozilla-nss-devel less than 3.12.6-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059419" comment="mozilla-nss-tools less than 3.12.6-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059421" comment="mozilla-nss less than 3.12.6-3.1.1"/>
		</criteria>
	</criteria>
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- 346a49e9bb17a1f69b59369ffc7a7196 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059477" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059495" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059496" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059478" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059498" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059479" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059619" comment="python-xpcom190 less than 1.9.0.19-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 470d54b3be4e369bbde36bf7ae7fa6ca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059339" comment="libopenssl-devel less than 0.9.8h-28.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059340" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059341" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059342" comment="libopenssl0_9_8 less than 0.9.8h-28.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059343" comment="openssl-certs less than 0.9.8h-25.2.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059344" comment="openssl-doc less than 0.9.8h-28.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059345" comment="openssl less than 0.9.8h-28.15.1"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
	<!-- 5fc9dc30115cae9ac4de2fbff8371b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059603" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059604" comment="MozillaFirefox-translations-common less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059605" comment="MozillaFirefox-translations-other less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059645" comment="autoconf213 less than 2.13-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059646" comment="beagle-devel less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059647" comment="beagle-epiphany less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059648" comment="beagle-evolution less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059649" comment="beagle-firefox less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059650" comment="beagle-google less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059651" comment="beagle-gui less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059652" comment="beagle-lang less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059653" comment="beagle-thunderbird less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059654" comment="beagle less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059655" comment="mhtml-firefox less than 0.5-1.27.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059484" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059500" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059501" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059485" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059606" comment="mozilla-xulrunner191-translations-common less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059607" comment="mozilla-xulrunner191-translations-other less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059608" comment="python-xpcom191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 82c4031c81a758c77487c1355139d333 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064846" comment="gnutls less than 2.4.1-24.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064847" comment="libgnutls-devel less than 2.4.1-24.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064848" comment="libgnutls-extra-devel less than 2.4.1-24.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064849" comment="libgnutls-extra26 less than 2.4.1-24.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064850" comment="libgnutls26-32bit less than 2.4.1-24.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064851" comment="libgnutls26-64bit less than 2.4.1-24.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064852" comment="libgnutls26 less than 2.4.1-24.8.1"/>
		</criteria>
	</criteria>
	<!-- 8446b116898e33640c58be9a9340fc91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056260" comment="compat-openssl097g-32bit less than 0.9.7g-146.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056261" comment="compat-openssl097g-64bit less than 0.9.7g-146.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056262" comment="compat-openssl097g less than 0.9.7g-146.11.1"/>
		</criteria>
	</criteria>
	<!-- 991ebf790cba19d559ab1e15ccdc1096 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059656" comment="MozillaFirefox-branding-openSUSE less than 3.5-10.1.1"/>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e4785cb5d726a98caf1eaac50c035b49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056305" comment="libopenssl-devel less than 0.9.8h-28.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056306" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056307" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056308" comment="libopenssl0_9_8 less than 0.9.8h-28.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056309" comment="openssl-certs less than 0.9.8h-25.2.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056310" comment="openssl-doc less than 0.9.8h-28.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056311" comment="openssl less than 0.9.8h-28.11.1"/>
		</criteria>
	</criteria>
	<!-- ee93b41dfd42ae8beca8d221b037f87c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065310" comment="gnutls less than 2.4.1-24.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065311" comment="libgnutls-devel less than 2.4.1-24.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065312" comment="libgnutls-extra-devel less than 2.4.1-24.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065313" comment="libgnutls-extra26 less than 2.4.1-24.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065314" comment="libgnutls26-32bit less than 2.4.1-24.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065315" comment="libgnutls26-64bit less than 2.4.1-24.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065316" comment="libgnutls26 less than 2.4.1-24.10.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3560</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560" source="CVE"/>
	<description>
	The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2cc68d0ce474e04b91d9bd5dd8ab3fd9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058346" comment="libexpat0-32bit less than 1.95.8-64.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058347" comment="libexpat0-64bit less than 1.95.8-64.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058348" comment="libexpat0 less than 1.95.8-64.50.1"/>
		</criteria>
	</criteria>
	<!-- 5d2b76c2e616bd0554e6be62b375d69b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057244" comment="expat less than 2.0.1-88.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057245" comment="libexpat-devel less than 2.0.1-88.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057246" comment="libexpat1-32bit less than 2.0.1-88.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057247" comment="libexpat1-64bit less than 2.0.1-88.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057248" comment="libexpat1 less than 2.0.1-88.18.1"/>
		</criteria>
	</criteria>
	<!-- 63cd604284f0ecefce6f29b0f9c61d30 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060413" comment="libpython2_6-1_0-32bit less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060414" comment="libpython2_6-1_0-64bit less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060415" comment="libpython2_6-1_0 less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060416" comment="python-32bit less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060417" comment="python-64bit less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060418" comment="python-base-32bit less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060419" comment="python-base-64bit less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060420" comment="python-base less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060421" comment="python-curses less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060422" comment="python-demo less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060423" comment="python-devel less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060424" comment="python-gdbm less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060425" comment="python-idle less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060426" comment="python-tk less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060427" comment="python-xml less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060428" comment="python less than 2.6.0-2.23.1"/>
		</criteria>
	</criteria>
	<!-- 71340217590c26c58d84a5b21a2ab796 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056843" comment="expat less than 2.0.1-88.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056844" comment="libexpat-devel less than 2.0.1-88.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056845" comment="libexpat1-32bit less than 2.0.1-88.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056846" comment="libexpat1-64bit less than 2.0.1-88.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056847" comment="libexpat1 less than 2.0.1-88.17.1"/>
		</criteria>
	</criteria>
	<!-- 926d4e9f90d8bba440201cb608fc6996 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056877" comment="pyxml less than 0.8.4-194.32.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3563</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563" source="CVE"/>
	<description>
	ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
	</description>
 </metadata>
<!-- 3cac3fb5903c9272730a8239dda56078 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057196" comment="ntp-doc less than 4.2.4p6-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057197" comment="ntp less than 4.2.4p6-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3575</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3575" source="CVE"/>
	<description>
	Buffer overflow in DHTRoutingTableDeserializer.cc in aria2 0.15.3, 1.2.0, and other versions allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 5e9884150fc6014411b8fa47cbc469b0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055350" comment="aria2 less than 0.16.0-1.19.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3602</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3602" source="CVE"/>
	<description>
	Unbound before 1.3.4 does not properly verify signatures for NSEC3 records, which allows remote attackers to cause secure delegations to be downgraded via DNS spoofing or other DNS-related attacks in conjunction with crafted delegation responses.
	</description>
 </metadata>
<!-- 79c9fd7b57467b50a85757b50e4f1518 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058349" comment="unbound-devel less than 1.0.0-2.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058350" comment="unbound less than 1.0.0-2.22.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3603</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603" source="CVE"/>
	<description>
	Integer overflow in the SplashBitmap::SplashBitmap function in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1 might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1188.
	</description>
 </metadata>
<!-- ddc0dce75cdd93e43e1609da50c8406b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056085" comment="xpdf-tools less than 3.02-97.81.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056086" comment="xpdf less than 3.02-97.81.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3604</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604" source="CVE"/>
	<description>
	The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF, does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document that triggers a NULL pointer dereference or a heap-based buffer overflow.
	</description>
 </metadata>
<!-- ddc0dce75cdd93e43e1609da50c8406b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056085" comment="xpdf-tools less than 3.02-97.81.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056086" comment="xpdf less than 3.02-97.81.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3605</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605" source="CVE"/>
	<description>
	Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/.  NOTE: this may overlap CVE-2009-0791.
	</description>
 </metadata>
<!-- ddc0dce75cdd93e43e1609da50c8406b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056085" comment="xpdf-tools less than 3.02-97.81.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056086" comment="xpdf less than 3.02-97.81.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3606</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606" source="CVE"/>
	<description>
	Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- ddc0dce75cdd93e43e1609da50c8406b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056085" comment="xpdf-tools less than 3.02-97.81.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056086" comment="xpdf less than 3.02-97.81.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3607</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607" source="CVE"/>
	<description>
	Integer overflow in the create_surface_from_thumbnail_data function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 4483982df88e47790f164139758639ff -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057056" comment="libpoppler-devel less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057057" comment="libpoppler-doc less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057058" comment="libpoppler-glib-devel less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057059" comment="libpoppler-glib4 less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057060" comment="libpoppler-qt2 less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057061" comment="libpoppler-qt3-devel less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057062" comment="libpoppler-qt4-3 less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057063" comment="libpoppler-qt4-devel less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057064" comment="libpoppler4 less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057065" comment="poppler-tools less than 0.10.1-1.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3608</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608" source="CVE"/>
	<description>
	Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38c2eb2d90c11bd3174d38f79b5dabcc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056245" comment="kdegraphics3-pdf less than 3.5.10-1.64.1"/>
	</criteria>
	<!-- 4483982df88e47790f164139758639ff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057056" comment="libpoppler-devel less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057057" comment="libpoppler-doc less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057058" comment="libpoppler-glib-devel less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057059" comment="libpoppler-glib4 less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057060" comment="libpoppler-qt2 less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057061" comment="libpoppler-qt3-devel less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057062" comment="libpoppler-qt4-3 less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057063" comment="libpoppler-qt4-devel less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057064" comment="libpoppler4 less than 0.10.1-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057065" comment="poppler-tools less than 0.10.1-1.7.1"/>
		</criteria>
	</criteria>
	<!-- ddc0dce75cdd93e43e1609da50c8406b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056085" comment="xpdf-tools less than 3.02-97.81.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056086" comment="xpdf less than 3.02-97.81.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3609</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609" source="CVE"/>
	<description>
	Integer overflow in the ImageStream::ImageStream function in Stream.cc in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, and CUPS pdftops, allows remote attackers to cause a denial of service (application crash) via a crafted PDF document that triggers a NULL pointer dereference or buffer over-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38c2eb2d90c11bd3174d38f79b5dabcc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056245" comment="kdegraphics3-pdf less than 3.5.10-1.64.1"/>
	</criteria>
	<!-- ddc0dce75cdd93e43e1609da50c8406b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056085" comment="xpdf-tools less than 3.02-97.81.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056086" comment="xpdf less than 3.02-97.81.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3612</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3612" source="CVE"/>
	<description>
	The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.
	</description>
 </metadata>
<!-- 971c806ecaf91d73fc2850362bf9f623 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056428" comment="kernel-debug-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056429" comment="kernel-debug-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056430" comment="kernel-debug less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056431" comment="kernel-default-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056432" comment="kernel-default-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056433" comment="kernel-default less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056434" comment="kernel-docs less than 2.6.3-3.13.66"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056435" comment="kernel-kdump less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056436" comment="kernel-pae-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056437" comment="kernel-pae-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056438" comment="kernel-pae less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056439" comment="kernel-ppc64-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056440" comment="kernel-ppc64-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056441" comment="kernel-ppc64 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056442" comment="kernel-ps3 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056443" comment="kernel-source less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056444" comment="kernel-syms less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056445" comment="kernel-trace-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056446" comment="kernel-trace-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056447" comment="kernel-trace less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056448" comment="kernel-vanilla less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056449" comment="kernel-xen-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056450" comment="kernel-xen-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056451" comment="kernel-xen less than 2.6.27.39-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3615</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615" source="CVE"/>
	<description>
	The OSCAR protocol plugin in libpurple in Pidgin before 2.6.3 and Adium before 1.3.7 allows remote attackers to cause a denial of service (application crash) via crafted contact-list data for (1) ICQ and possibly (2) AIM, as demonstrated by the SIM IM client.
	</description>
 </metadata>
<!-- 5d83b2cd58eab7e12eb8ef070639116e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056729" comment="cdparanoia-32bit less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056730" comment="cdparanoia-64bit less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056731" comment="cdparanoia less than IIIalpha9.8-690.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056732" comment="cdparanoia less than IIIalpha9.8-690.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056733" comment="cdparanoia less than IIIalpha9.8-690.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056734" comment="check-32bit less than 0.9.5-63.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056735" comment="check-64bit less than 0.9.5-63.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056736" comment="check less than 0.9.5-63.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056737" comment="check less than 0.9.5-63.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056738" comment="check less than 0.9.5-63.51"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056739" comment="desktop-file-utils less than 0.15-1.113"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056740" comment="desktop-file-utils less than 0.15-1.119"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056527" comment="desktop-file-utils less than 0.15-1.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056741" comment="fam-32bit less than 2.7.0-129.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056742" comment="fam-64bit less than 2.7.0-129.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056743" comment="fam less than 2.7.0-129.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056744" comment="fam less than 2.7.0-129.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056745" comment="fam less than 2.7.0-129.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056553" comment="finch-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056554" comment="finch less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056746" comment="gnome-vfs2-32bit less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056747" comment="gnome-vfs2-lang less than 2.24.0-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056748" comment="gnome-vfs2-lang less than 2.24.0-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056749" comment="gnome-vfs2-lang less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056750" comment="gnome-vfs2 less than 2.24.0-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056751" comment="gnome-vfs2 less than 2.24.0-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056752" comment="gnome-vfs2 less than 2.24.0-3.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056753" comment="gstreamer-0_10-32bit less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056754" comment="gstreamer-0_10-64bit less than 0.10.21-3.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056755" comment="gstreamer-0_10-lang less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056756" comment="gstreamer-0_10-lang less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056757" comment="gstreamer-0_10-lang less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056758" comment="gstreamer-0_10 less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056759" comment="gstreamer-0_10 less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056760" comment="gstreamer-0_10 less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056761" comment="libgstreamer-0_10-0-32bit less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056762" comment="libgstreamer-0_10-0-64bit less than 0.10.21-3.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056763" comment="libgstreamer-0_10-0 less than 0.10.21-3.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056764" comment="libgstreamer-0_10-0 less than 0.10.21-3.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056765" comment="libgstreamer-0_10-0 less than 0.10.21-3.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056766" comment="libogg0-32bit less than 1.1.3-86.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056767" comment="libogg0-64bit less than 1.1.3-86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056768" comment="libogg0 less than 1.1.3-86.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056769" comment="libogg0 less than 1.1.3-86.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056770" comment="libogg0 less than 1.1.3-86.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056771" comment="liboil-32bit less than 0.3.15-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056772" comment="liboil-64bit less than 0.3.15-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056773" comment="liboil less than 0.3.15-1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056774" comment="liboil less than 0.3.15-1.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056775" comment="liboil less than 0.3.15-1.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056557" comment="libpurple-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056558" comment="libpurple-lang less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056608" comment="libpurple-meanwhile less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056609" comment="libpurple-mono less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056559" comment="libpurple less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056776" comment="libtheora0-32bit less than 1.0.beta2-3.94"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056777" comment="libtheora0 less than 1.0.beta2-3.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056778" comment="libtheora0 less than 1.0.beta2-3.94"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056779" comment="libtheora0 less than 1.0.beta2-3.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056780" comment="libvisual-32bit less than 0.4.0-174.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056781" comment="libvisual-64bit less than 0.4.0-174.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056782" comment="libvisual less than 0.4.0-174.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056783" comment="libvisual less than 0.4.0-174.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056784" comment="libvisual less than 0.4.0-174.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056785" comment="libvorbis-32bit less than 1.2.0-78.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056786" comment="libvorbis-64bit less than 1.2.0-78.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056787" comment="libvorbis less than 1.2.0-78.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056788" comment="libvorbis less than 1.2.0-78.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056789" comment="libvorbis less than 1.2.0-78.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056560" comment="pidgin-devel less than 2.6.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056790" comment="pidgin-otr less than 3.2.0-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056791" comment="pidgin-otr less than 3.2.0-1.16.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056561" comment="pidgin less than 2.6.3-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3616</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3616" source="CVE"/>
	<description>
	Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 05112c21c454767c8572d5c0784b53c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056321" comment="qemu less than 0.10.1-0.2.1"/>
	</criteria>
	<!-- a3c4f732a4d35adf0172a8c430a54f44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056337" comment="kvm-kmp-default less than 78.2.6.30.1_2.6.27.37_0.1-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056338" comment="kvm-kmp-pae less than 78.2.6.30.1_2.6.27.37_0.1-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056339" comment="kvm-kmp-trace less than 78.2.6.30.1_2.6.27.37_0.1-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056340" comment="kvm less than 78.0.10.6-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3618</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3618" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in viewvc.py in ViewVC 1.0 before 1.0.9 and 1.1 before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the view parameter.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 4c67ef023be55d96ff2ab7b625418498 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055769" comment="viewvc less than 1.0.9-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3619</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3619" source="CVE"/>
	<description>
	Unspecified vulnerability in ViewVC 1.0 before 1.0.9 and 1.1 before 1.1.2 has unknown impact and remote attack vectors related to "printing illegal parameter names and values."
	</description>
 </metadata>
<!-- 4c67ef023be55d96ff2ab7b625418498 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055769" comment="viewvc less than 1.0.9-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3620</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3620" source="CVE"/>
	<description>
	The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.
	</description>
 </metadata>
<!-- 971c806ecaf91d73fc2850362bf9f623 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056428" comment="kernel-debug-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056429" comment="kernel-debug-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056430" comment="kernel-debug less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056431" comment="kernel-default-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056432" comment="kernel-default-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056433" comment="kernel-default less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056434" comment="kernel-docs less than 2.6.3-3.13.66"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056435" comment="kernel-kdump less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056436" comment="kernel-pae-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056437" comment="kernel-pae-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056438" comment="kernel-pae less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056439" comment="kernel-ppc64-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056440" comment="kernel-ppc64-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056441" comment="kernel-ppc64 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056442" comment="kernel-ps3 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056443" comment="kernel-source less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056444" comment="kernel-syms less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056445" comment="kernel-trace-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056446" comment="kernel-trace-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056447" comment="kernel-trace less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056448" comment="kernel-vanilla less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056449" comment="kernel-xen-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056450" comment="kernel-xen-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056451" comment="kernel-xen less than 2.6.27.39-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3621</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3621" source="CVE"/>
	<description>
	net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.
	</description>
 </metadata>
<!-- 971c806ecaf91d73fc2850362bf9f623 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056428" comment="kernel-debug-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056429" comment="kernel-debug-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056430" comment="kernel-debug less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056431" comment="kernel-default-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056432" comment="kernel-default-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056433" comment="kernel-default less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056434" comment="kernel-docs less than 2.6.3-3.13.66"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056435" comment="kernel-kdump less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056436" comment="kernel-pae-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056437" comment="kernel-pae-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056438" comment="kernel-pae less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056439" comment="kernel-ppc64-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056440" comment="kernel-ppc64-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056441" comment="kernel-ppc64 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056442" comment="kernel-ps3 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056443" comment="kernel-source less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056444" comment="kernel-syms less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056445" comment="kernel-trace-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056446" comment="kernel-trace-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056447" comment="kernel-trace less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056448" comment="kernel-vanilla less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056449" comment="kernel-xen-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056450" comment="kernel-xen-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056451" comment="kernel-xen less than 2.6.27.39-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3627</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3627" source="CVE"/>
	<description>
	The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character.
	</description>
 </metadata>
<!-- b26370214cc3ff791660851dd3190b7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056807" comment="perl-HTML-Parser less than 3.56-1.85.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3638</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3638" source="CVE"/>
	<description>
	Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function in arch/x86/kvm/x86.c in the KVM subsystem in the Linux kernel before 2.6.31.4 allows local users to have an unspecified impact via a KVM_GET_SUPPORTED_CPUID request to the kvm_arch_dev_ioctl function.
	</description>
 </metadata>
<!-- a3c4f732a4d35adf0172a8c430a54f44 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056337" comment="kvm-kmp-default less than 78.2.6.30.1_2.6.27.37_0.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056338" comment="kvm-kmp-pae less than 78.2.6.30.1_2.6.27.37_0.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056339" comment="kvm-kmp-trace less than 78.2.6.30.1_2.6.27.37_0.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056340" comment="kvm less than 78.0.10.6-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3640</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3640" source="CVE"/>
	<description>
	The update_cr8_intercept function in arch/x86/kvm/x86.c in the KVM subsystem in the Linux kernel before 2.6.32-rc1 does not properly handle the absence of an Advanced Programmable Interrupt Controller (APIC), which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via a call to the kvm_vcpu_ioctl function.
	</description>
 </metadata>
<!-- a3c4f732a4d35adf0172a8c430a54f44 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056337" comment="kvm-kmp-default less than 78.2.6.30.1_2.6.27.37_0.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056338" comment="kvm-kmp-pae less than 78.2.6.30.1_2.6.27.37_0.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056339" comment="kvm-kmp-trace less than 78.2.6.30.1_2.6.27.37_0.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056340" comment="kvm less than 78.0.10.6-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3700</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3700" source="CVE"/>
	<description>
	Buffer overflow in sgLog.c in squidGuard 1.3 and 1.4 allows remote attackers to cause a denial of service (application hang or loss of blocking functionality) via a long URL with many / (slash) characters, related to "emergency mode."
	</description>
 </metadata>
<!-- c30e2f232540b7b0f16d2c8fb4973c36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061928" comment="squidGuard less than 1.3-57.67.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3720</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720" source="CVE"/>
	<description>
	The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 63cd604284f0ecefce6f29b0f9c61d30 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060413" comment="libpython2_6-1_0-32bit less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060414" comment="libpython2_6-1_0-64bit less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060415" comment="libpython2_6-1_0 less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060416" comment="python-32bit less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060417" comment="python-64bit less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060418" comment="python-base-32bit less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060419" comment="python-base-64bit less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060420" comment="python-base less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060421" comment="python-curses less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060422" comment="python-demo less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060423" comment="python-devel less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060424" comment="python-gdbm less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060425" comment="python-idle less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060426" comment="python-tk less than 2.6.0-2.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060427" comment="python-xml less than 2.6.0-2.22.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060428" comment="python less than 2.6.0-2.23.1"/>
		</criteria>
	</criteria>
	<!-- 926d4e9f90d8bba440201cb608fc6996 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056877" comment="pyxml less than 0.8.4-194.32.1"/>
	</criteria>
	<!-- d429e340ae88e5a9f565a801fa3f9854 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056056" comment="expat less than 2.0.1-88.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056057" comment="libexpat-devel less than 2.0.1-88.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056058" comment="libexpat1-32bit less than 2.0.1-88.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056059" comment="libexpat1-64bit less than 2.0.1-88.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056060" comment="libexpat1 less than 2.0.1-88.16.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3726</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3726" source="CVE"/>
	<description>
	The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.
	</description>
 </metadata>
<!-- 971c806ecaf91d73fc2850362bf9f623 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056428" comment="kernel-debug-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056429" comment="kernel-debug-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056430" comment="kernel-debug less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056431" comment="kernel-default-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056432" comment="kernel-default-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056433" comment="kernel-default less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056434" comment="kernel-docs less than 2.6.3-3.13.66"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056435" comment="kernel-kdump less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056436" comment="kernel-pae-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056437" comment="kernel-pae-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056438" comment="kernel-pae less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056439" comment="kernel-ppc64-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056440" comment="kernel-ppc64-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056441" comment="kernel-ppc64 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056442" comment="kernel-ps3 less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056443" comment="kernel-source less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056444" comment="kernel-syms less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056445" comment="kernel-trace-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056446" comment="kernel-trace-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056447" comment="kernel-trace less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056448" comment="kernel-vanilla less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056449" comment="kernel-xen-base less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056450" comment="kernel-xen-extra less than 2.6.27.39-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056451" comment="kernel-xen less than 2.6.27.39-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3728</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3728" source="CVE"/>
	<description>
	Directory traversal vulnerability in the ICC_Profile.getInstance method in Java Runtime Environment (JRE) in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local International Color Consortium (ICC) profile files via a .. (dot dot) in a pathname, aka Bug Id 6631533.
	</description>
 </metadata>
<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3736</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736" source="CVE"/>
	<description>
	ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
	</description>
 </metadata>
<!-- 7a8b73fdf49c4662baf96f0baa7426eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057135" comment="libltdl7-32bit less than 2.2.6-1.36.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057136" comment="libltdl7-64bit less than 2.2.6-1.36.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057137" comment="libltdl7 less than 2.2.6-1.36.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057138" comment="libtool-32bit less than 2.2.6-1.36.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057139" comment="libtool-64bit less than 2.2.6-1.36.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057140" comment="libtool less than 2.2.6-1.36.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3793</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3793" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory consumption) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3794</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3794" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allows remote attackers to execute arbitrary code via crafted dimensions of JPEG data in an SWF file.
	</description>
 </metadata>
<!-- fc546d4bd6373f7984a13d4f7e2150d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056944" comment="flash-player less than 10.0.42.34-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3796</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3796" source="CVE"/>
	<description>
	Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors, related to a "data injection vulnerability."
	</description>
 </metadata>
<!-- fc546d4bd6373f7984a13d4f7e2150d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056944" comment="flash-player less than 10.0.42.34-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3797</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3797" source="CVE"/>
	<description>
	Adobe Flash Player 10.x before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- fc546d4bd6373f7984a13d4f7e2150d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056944" comment="flash-player less than 10.0.42.34-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3798</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3798" source="CVE"/>
	<description>
	Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- fc546d4bd6373f7984a13d4f7e2150d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056944" comment="flash-player less than 10.0.42.34-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3799</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3799" source="CVE"/>
	<description>
	Integer overflow in the Verifier::parseExceptionHandlers function in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allows remote attackers to execute arbitrary code via an SWF file with a large exception_count value that triggers memory corruption, related to "generation of ActionScript exception handlers."
	</description>
 </metadata>
<!-- fc546d4bd6373f7984a13d4f7e2150d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056944" comment="flash-player less than 10.0.42.34-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3800</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3800" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allow attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- fc546d4bd6373f7984a13d4f7e2150d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056944" comment="flash-player less than 10.0.42.34-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3826</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3826" source="CVE"/>
	<description>
	Multiple buffer overflows in squidGuard 1.4 allow remote attackers to bypass intended URL blocking via a long URL, related to (1) the relationship between a certain buffer size in squidGuard and a certain buffer size in Squid and (2) a redirect URL that contains information about the originally requested URL.
	</description>
 </metadata>
<!-- c30e2f232540b7b0f16d2c8fb4973c36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061928" comment="squidGuard less than 1.3-57.67.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3829</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829" source="CVE"/>
	<description>
	Integer overflow in wiretap/erf.c in Wireshark before 1.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted erf file, related to an "unsigned integer wrap vulnerability."
	</description>
 </metadata>
<!-- 8e08d9b8b625bc9fb7365a4b7e6d2187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056456" comment="wireshark-devel less than 1.0.4-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056457" comment="wireshark less than 1.0.4-2.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3831</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3831" source="CVE"/>
	<description>
	Opera before 10.01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted domain name.
	</description>
 </metadata>
<!-- c9f84e41a039525ebc68632da6edb55a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056091" comment="opera less than 10.01-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3864</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3864" source="CVE"/>
	<description>
	The Java Update functionality in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22 and JDK and JRE 6 before Update 17, when a non-English version of Windows is used, does not retrieve available new JRE versions, which allows remote attackers to leverage vulnerabilities in older releases of this software, aka Bug Id 6869694.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ebc9273e381dc612cf56ce38116b6a6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056113" comment="java-1_5_0-sun-alsa less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056114" comment="java-1_5_0-sun-devel less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056115" comment="java-1_5_0-sun-jdbc less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056116" comment="java-1_5_0-sun-plugin less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056117" comment="java-1_5_0-sun-src less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056118" comment="java-1_5_0-sun less than 1.5.0_update22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2eee2fe9af55d32793d757b22be882a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056292" comment="java-1_6_0-sun-alsa less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056293" comment="java-1_6_0-sun-devel less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056294" comment="java-1_6_0-sun-jdbc less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056296" comment="java-1_6_0-sun-src less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3865</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3865" source="CVE"/>
	<description>
	The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.
	</description>
 </metadata>
<!-- e2eee2fe9af55d32793d757b22be882a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056292" comment="java-1_6_0-sun-alsa less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056293" comment="java-1_6_0-sun-devel less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056294" comment="java-1_6_0-sun-jdbc less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056296" comment="java-1_6_0-sun-src less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3866</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3866" source="CVE"/>
	<description>
	The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.
	</description>
 </metadata>
<!-- e2eee2fe9af55d32793d757b22be882a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056292" comment="java-1_6_0-sun-alsa less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056293" comment="java-1_6_0-sun-devel less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056294" comment="java-1_6_0-sun-jdbc less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056296" comment="java-1_6_0-sun-src less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3867</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3867" source="CVE"/>
	<description>
	Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ebc9273e381dc612cf56ce38116b6a6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056113" comment="java-1_5_0-sun-alsa less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056114" comment="java-1_5_0-sun-devel less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056115" comment="java-1_5_0-sun-jdbc less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056116" comment="java-1_5_0-sun-plugin less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056117" comment="java-1_5_0-sun-src less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056118" comment="java-1_5_0-sun less than 1.5.0_update22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2eee2fe9af55d32793d757b22be882a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056292" comment="java-1_6_0-sun-alsa less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056293" comment="java-1_6_0-sun-devel less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056294" comment="java-1_6_0-sun-jdbc less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056296" comment="java-1_6_0-sun-src less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3868</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3868" source="CVE"/>
	<description>
	Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ebc9273e381dc612cf56ce38116b6a6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056113" comment="java-1_5_0-sun-alsa less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056114" comment="java-1_5_0-sun-devel less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056115" comment="java-1_5_0-sun-jdbc less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056116" comment="java-1_5_0-sun-plugin less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056117" comment="java-1_5_0-sun-src less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056118" comment="java-1_5_0-sun less than 1.5.0_update22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2eee2fe9af55d32793d757b22be882a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056292" comment="java-1_6_0-sun-alsa less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056293" comment="java-1_6_0-sun-devel less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056294" comment="java-1_6_0-sun-jdbc less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056296" comment="java-1_6_0-sun-src less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3869</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3869" source="CVE"/>
	<description>
	Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ebc9273e381dc612cf56ce38116b6a6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056113" comment="java-1_5_0-sun-alsa less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056114" comment="java-1_5_0-sun-devel less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056115" comment="java-1_5_0-sun-jdbc less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056116" comment="java-1_5_0-sun-plugin less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056117" comment="java-1_5_0-sun-src less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056118" comment="java-1_5_0-sun less than 1.5.0_update22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2eee2fe9af55d32793d757b22be882a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056292" comment="java-1_6_0-sun-alsa less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056293" comment="java-1_6_0-sun-devel less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056294" comment="java-1_6_0-sun-jdbc less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056296" comment="java-1_6_0-sun-src less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3871</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3871" source="CVE"/>
	<description>
	Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ebc9273e381dc612cf56ce38116b6a6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056113" comment="java-1_5_0-sun-alsa less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056114" comment="java-1_5_0-sun-devel less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056115" comment="java-1_5_0-sun-jdbc less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056116" comment="java-1_5_0-sun-plugin less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056117" comment="java-1_5_0-sun-src less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056118" comment="java-1_5_0-sun less than 1.5.0_update22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2eee2fe9af55d32793d757b22be882a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056292" comment="java-1_6_0-sun-alsa less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056293" comment="java-1_6_0-sun-devel less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056294" comment="java-1_6_0-sun-jdbc less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056296" comment="java-1_6_0-sun-src less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3872</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3872" source="CVE"/>
	<description>
	Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ebc9273e381dc612cf56ce38116b6a6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056113" comment="java-1_5_0-sun-alsa less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056114" comment="java-1_5_0-sun-devel less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056115" comment="java-1_5_0-sun-jdbc less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056116" comment="java-1_5_0-sun-plugin less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056117" comment="java-1_5_0-sun-src less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056118" comment="java-1_5_0-sun less than 1.5.0_update22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2eee2fe9af55d32793d757b22be882a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056292" comment="java-1_6_0-sun-alsa less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056293" comment="java-1_6_0-sun-devel less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056294" comment="java-1_6_0-sun-jdbc less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056296" comment="java-1_6_0-sun-src less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3873</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3873" source="CVE"/>
	<description>
	The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ebc9273e381dc612cf56ce38116b6a6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056113" comment="java-1_5_0-sun-alsa less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056114" comment="java-1_5_0-sun-devel less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056115" comment="java-1_5_0-sun-jdbc less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056116" comment="java-1_5_0-sun-plugin less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056117" comment="java-1_5_0-sun-src less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056118" comment="java-1_5_0-sun less than 1.5.0_update22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2eee2fe9af55d32793d757b22be882a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056292" comment="java-1_6_0-sun-alsa less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056293" comment="java-1_6_0-sun-devel less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056294" comment="java-1_6_0-sun-jdbc less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056296" comment="java-1_6_0-sun-src less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3874</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3874" source="CVE"/>
	<description>
	Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ebc9273e381dc612cf56ce38116b6a6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056113" comment="java-1_5_0-sun-alsa less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056114" comment="java-1_5_0-sun-devel less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056115" comment="java-1_5_0-sun-jdbc less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056116" comment="java-1_5_0-sun-plugin less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056117" comment="java-1_5_0-sun-src less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056118" comment="java-1_5_0-sun less than 1.5.0_update22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2eee2fe9af55d32793d757b22be882a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056292" comment="java-1_6_0-sun-alsa less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056293" comment="java-1_6_0-sun-devel less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056294" comment="java-1_6_0-sun-jdbc less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056296" comment="java-1_6_0-sun-src less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3875</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3875" source="CVE"/>
	<description>
	The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to "timing attack vulnerabilities," aka Bug Id 6863503.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ebc9273e381dc612cf56ce38116b6a6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056113" comment="java-1_5_0-sun-alsa less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056114" comment="java-1_5_0-sun-devel less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056115" comment="java-1_5_0-sun-jdbc less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056116" comment="java-1_5_0-sun-plugin less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056117" comment="java-1_5_0-sun-src less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056118" comment="java-1_5_0-sun less than 1.5.0_update22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2eee2fe9af55d32793d757b22be882a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056292" comment="java-1_6_0-sun-alsa less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056293" comment="java-1_6_0-sun-devel less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056294" comment="java-1_6_0-sun-jdbc less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056296" comment="java-1_6_0-sun-src less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3876</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3876" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ebc9273e381dc612cf56ce38116b6a6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056113" comment="java-1_5_0-sun-alsa less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056114" comment="java-1_5_0-sun-devel less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056115" comment="java-1_5_0-sun-jdbc less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056116" comment="java-1_5_0-sun-plugin less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056117" comment="java-1_5_0-sun-src less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056118" comment="java-1_5_0-sun less than 1.5.0_update22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2eee2fe9af55d32793d757b22be882a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056292" comment="java-1_6_0-sun-alsa less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056293" comment="java-1_6_0-sun-devel less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056294" comment="java-1_6_0-sun-jdbc less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056296" comment="java-1_6_0-sun-src less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3877</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3877" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ebc9273e381dc612cf56ce38116b6a6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056113" comment="java-1_5_0-sun-alsa less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056114" comment="java-1_5_0-sun-devel less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056115" comment="java-1_5_0-sun-jdbc less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056116" comment="java-1_5_0-sun-plugin less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056117" comment="java-1_5_0-sun-src less than 1.5.0_update22-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056118" comment="java-1_5_0-sun less than 1.5.0_update22-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- e2eee2fe9af55d32793d757b22be882a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056292" comment="java-1_6_0-sun-alsa less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056293" comment="java-1_6_0-sun-devel less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056294" comment="java-1_6_0-sun-jdbc less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056296" comment="java-1_6_0-sun-src less than 1.6.0.u17-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3879</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3879" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the (1) X11 and (2) Win32GraphicsDevice subsystems in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and attack vectors, related to failure to clone arrays that are returned by the getConfigurations function, aka Bug Id 6822057.
	</description>
 </metadata>
<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3880</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3880" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3880" source="CVE"/>
	<description>
	The Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, does not properly restrict the objects that may be sent to loggers, which allows attackers to obtain sensitive information via vectors related to the implementation of Component, KeyboardFocusManager, and DefaultKeyboardFocusManager, aka Bug Id 6664512.
	</description>
 </metadata>
<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3881</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3881" source="CVE"/>
	<description>
	Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, does not prevent the existence of children of a resurrected ClassLoader, which allows remote attackers to gain privileges via unspecified vectors, related to an "information leak vulnerability," aka Bug Id 6636650.
	</description>
 </metadata>
<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3882</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3882" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to "information leaks in mutable variables," aka Bug Id 6657026.
	</description>
 </metadata>
<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3883</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3883" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the Windows Pluggable Look and Feel (PL&amp;F) feature in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to "information leaks in mutable variables," aka Bug Id 6657138.
	</description>
 </metadata>
<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3884</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3884" source="CVE"/>
	<description>
	The TimeZone.getTimeZone method in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local files via vectors related to handling of zoneinfo (aka tz) files, aka Bug Id 6824265.
	</description>
 </metadata>
<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3885</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3885" source="CVE"/>
	<description>
	Sun Java SE 5.0 before Update 22 and 6 before Update 17 on Windows allows remote attackers to cause a denial of service via a BMP file containing a link to a UNC share pathname for an International Color Consortium (ICC) profile file, probably a related issue to CVE-2007-2789, aka Bug Id 6632445.
	</description>
 </metadata>
<!-- e2e7daed7580c86bcb53feed9e9073a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056405" comment="java-1_6_0-openjdk-demo less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056406" comment="java-1_6_0-openjdk-devel less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056407" comment="java-1_6_0-openjdk-javadoc less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056408" comment="java-1_6_0-openjdk-plugin less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056409" comment="java-1_6_0-openjdk-src less than 1.6.2_b16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056410" comment="java-1_6_0-openjdk less than 1.6.2_b16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3909</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3909" source="CVE"/>
	<description>
	Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- fedbf2cd2eeb2032840dccb917eddc26 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059690" comment="gimp-branding-upstream less than 2.6.2-2.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059691" comment="gimp-devel less than 2.6.2-2.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059692" comment="gimp-doc less than 2.6.2-2.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059693" comment="gimp-lang less than 2.6.2-2.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059694" comment="gimp-plugins-python less than 2.6.2-2.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059695" comment="gimp less than 2.6.2-2.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3938</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3938" source="CVE"/>
	<description>
	Buffer overflow in the ABWOutputDev::endWord function in poppler/ABWOutputDev.cc in Poppler (aka libpoppler) 0.10.6, 0.12.0, and possibly other versions, as used by the Abiword pdftoabw utility, allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
<!-- 4483982df88e47790f164139758639ff -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057056" comment="libpoppler-devel less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057057" comment="libpoppler-doc less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057058" comment="libpoppler-glib-devel less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057059" comment="libpoppler-glib4 less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057060" comment="libpoppler-qt2 less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057061" comment="libpoppler-qt3-devel less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057062" comment="libpoppler-qt4-3 less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057063" comment="libpoppler-qt4-devel less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057064" comment="libpoppler4 less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057065" comment="poppler-tools less than 0.10.1-1.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3939</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3939" source="CVE"/>
	<description>
	The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3830bdefa112876096e97d7864937bc9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057211" comment="kernel-debug-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057212" comment="kernel-debug-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057213" comment="kernel-debug less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057214" comment="kernel-default-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057215" comment="kernel-default-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057216" comment="kernel-default less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057217" comment="kernel-docs less than 2.6.3-3.13.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057218" comment="kernel-kdump less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057219" comment="kernel-pae-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057220" comment="kernel-pae-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057221" comment="kernel-pae less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057222" comment="kernel-ppc64-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057223" comment="kernel-ppc64-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057224" comment="kernel-ppc64 less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057225" comment="kernel-ps3 less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057226" comment="kernel-source less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057227" comment="kernel-syms less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057228" comment="kernel-trace-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057229" comment="kernel-trace-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057230" comment="kernel-trace less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057231" comment="kernel-vanilla less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057232" comment="kernel-xen-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057233" comment="kernel-xen-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057234" comment="kernel-xen less than 2.6.27.42-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c86a1b7090754b33393ccb19a5f82147 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058516" comment="kernel-debug-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058517" comment="kernel-debug-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058518" comment="kernel-debug less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058492" comment="kernel-default-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058512" comment="kernel-default-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058493" comment="kernel-default less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058519" comment="kernel-docs less than 2.6.3-3.13.89"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058507" comment="kernel-kdump less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058501" comment="kernel-pae-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058515" comment="kernel-pae-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058502" comment="kernel-pae less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058508" comment="kernel-ppc64-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058520" comment="kernel-ppc64-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058509" comment="kernel-ppc64 less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058521" comment="kernel-ps3 less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058494" comment="kernel-source less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058495" comment="kernel-syms less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058522" comment="kernel-trace-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058523" comment="kernel-trace-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058524" comment="kernel-trace less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058525" comment="kernel-vanilla less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058497" comment="kernel-xen-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058513" comment="kernel-xen-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058498" comment="kernel-xen less than 2.6.27.45-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3940</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3940" source="CVE"/>
	<description>
	Unspecified vulnerability in Guest Additions in Sun xVM VirtualBox 1.6.x and 2.0.x before 2.0.12, 2.1.x, and 2.2.x, and Sun VirtualBox before 3.0.10, allows guest OS users to cause a denial of service (memory consumption) on the guest OS via unknown vectors.
	</description>
 </metadata>
<!-- 1297d8b2abfe71e091e93b8aaf32c101 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057512" comment="virtualbox-ose-guest-tools less than 2.0.6-2.9.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057513" comment="virtualbox-ose-kmp-debug less than 2.0.6_2.6.27.42_0.1-2.9.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057514" comment="virtualbox-ose-kmp-default less than 2.0.6_2.6.27.42_0.1-2.9.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057515" comment="virtualbox-ose-kmp-pae less than 2.0.6_2.6.27.42_0.1-2.9.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057516" comment="virtualbox-ose-kmp-trace less than 2.0.6_2.6.27.42_0.1-2.9.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057517" comment="virtualbox-ose less than 2.0.6-2.9.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057518" comment="xorg-x11-driver-virtualbox-ose less than 2.0.6-2.9.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3942</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3942" source="CVE"/>
	<description>
	Martin Lambers msmtp before 1.4.19, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- 50472277a8983b6e02cde01a1094f1f5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057379" comment="msmtp less than 1.4.16-1.28.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3951</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3951" source="CVE"/>
	<description>
	Unspecified vulnerability in the Flash Player ActiveX control in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 on Windows allows remote attackers to obtain the names of local files via unknown vectors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4820.
	</description>
 </metadata>
<!-- fc546d4bd6373f7984a13d4f7e2150d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056944" comment="flash-player less than 10.0.42.34-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3953</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3953" source="CVE"/>
	<description>
	The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration "array boundary issue," a different vulnerability than CVE-2009-2994.
	</description>
 </metadata>
<!-- cce6f950d887c9dbc2a539986dfc1a53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3954</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3954" source="CVE"/>
	<description>
	The 3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to execute arbitrary code via unspecified vectors, related to a "DLL-loading vulnerability."
	</description>
 </metadata>
<!-- cce6f950d887c9dbc2a539986dfc1a53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3955</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3955" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted JPC_MS_RGN marker in the Jp2c stream of a JpxDecode encoded data stream, which triggers an integer sign extension that bypasses a sanity check, leading to memory corruption.
	</description>
 </metadata>
<!-- cce6f950d887c9dbc2a539986dfc1a53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3956</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3956" source="CVE"/>
	<description>
	The default configuration of Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, does not enable the Enhanced Security feature, which has unspecified impact and attack vectors, related to a "script injection vulnerability," as demonstrated by Acrobat Forms Data Format (FDF) behavior that allows cross-site scripting (XSS) by user-assisted remote attackers.
	</description>
 </metadata>
<!-- cce6f950d887c9dbc2a539986dfc1a53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3957</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3957" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to cause a denial of service (NULL pointer dereference) via unspecified vectors.
	</description>
 </metadata>
<!-- cce6f950d887c9dbc2a539986dfc1a53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3958</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3958" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the NOS Microsystems getPlus Helper ActiveX control before 1.6.2.49 in gp.ocx in the Download Manager in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow remote attackers to execute arbitrary code via unspecified initialization parameters.
	</description>
 </metadata>
<!-- cce6f950d887c9dbc2a539986dfc1a53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3959</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3959" source="CVE"/>
	<description>
	Integer overflow in the U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a malformed PDF document.
	</description>
 </metadata>
<!-- cce6f950d887c9dbc2a539986dfc1a53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3979</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3979" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- c8eac3f3aab4972b2d705aced5754fb6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056983" comment="MozillaFirefox-branding-upstream less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056984" comment="MozillaFirefox-translations less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056985" comment="MozillaFirefox less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056893" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056953" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056954" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056894" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056956" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056895" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056897" comment="mozilla-xulrunner190 less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056986" comment="python-xpcom190 less than 1.9.0.16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3981</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3981" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox before 3.0.16, SeaMonkey before 2.0.1, and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- c8eac3f3aab4972b2d705aced5754fb6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056983" comment="MozillaFirefox-branding-upstream less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056984" comment="MozillaFirefox-translations less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056985" comment="MozillaFirefox less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056893" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056953" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056954" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056894" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056956" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056895" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056897" comment="mozilla-xulrunner190 less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056986" comment="python-xpcom190 less than 1.9.0.16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3983</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3983" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3911462b3f68f3f2a965113f5b360cd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059214" comment="MozillaThunderbird-devel less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059215" comment="MozillaThunderbird-translations less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059216" comment="MozillaThunderbird less than 2.0.0.24-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 905ae89bbd71f145a4b2ab6acdd1d659 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060701" comment="seamonkey-dom-inspector less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060702" comment="seamonkey-irc less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060703" comment="seamonkey-mail less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060704" comment="seamonkey-spellchecker less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060705" comment="seamonkey-venkman less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060706" comment="seamonkey less than 1.1.19-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c8eac3f3aab4972b2d705aced5754fb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056983" comment="MozillaFirefox-branding-upstream less than 3.0.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056984" comment="MozillaFirefox-translations less than 3.0.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056985" comment="MozillaFirefox less than 3.0.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056893" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056953" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056954" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056894" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056956" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056895" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056897" comment="mozilla-xulrunner190 less than 1.9.0.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056986" comment="python-xpcom190 less than 1.9.0.16-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3984</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3984" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.
	</description>
 </metadata>
<!-- c8eac3f3aab4972b2d705aced5754fb6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056983" comment="MozillaFirefox-branding-upstream less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056984" comment="MozillaFirefox-translations less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056985" comment="MozillaFirefox less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056893" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056953" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056954" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056894" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056956" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056895" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056897" comment="mozilla-xulrunner190 less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056986" comment="python-xpcom190 less than 1.9.0.16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3985</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3985" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to associate spoofed content with an invalid URL by setting document.location to this URL, and then writing arbitrary web script or HTML to the associated blank document, a related issue to CVE-2009-2654.
	</description>
 </metadata>
<!-- c8eac3f3aab4972b2d705aced5754fb6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056983" comment="MozillaFirefox-branding-upstream less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056984" comment="MozillaFirefox-translations less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056985" comment="MozillaFirefox less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056893" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056953" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056954" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056894" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056956" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056895" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056897" comment="mozilla-xulrunner190 less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056986" comment="python-xpcom190 less than 1.9.0.16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3986</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3986" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to execute arbitrary JavaScript with chrome privileges by leveraging a reference to a chrome window from a content window, related to the window.opener property.
	</description>
 </metadata>
<!-- c8eac3f3aab4972b2d705aced5754fb6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056983" comment="MozillaFirefox-branding-upstream less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056984" comment="MozillaFirefox-translations less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056985" comment="MozillaFirefox less than 3.0.16-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056893" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056953" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056954" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056894" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056956" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056895" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056897" comment="mozilla-xulrunner190 less than 1.9.0.16-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056986" comment="python-xpcom190 less than 1.9.0.16-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3988</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3988" source="CVE"/>
	<description>
	Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly restrict read access to object properties in showModalDialog, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via crafted dialogArguments values.
	</description>
 </metadata>
<!-- 3fd814ddf2f9d7e6b55ab6b2edaa3afa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058425" comment="MozillaFirefox-branding-upstream less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058426" comment="MozillaFirefox-branding-upstream less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058427" comment="MozillaFirefox-translations less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058428" comment="MozillaFirefox-translations less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058429" comment="MozillaFirefox less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058430" comment="MozillaFirefox less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058358" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058431" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058432" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058359" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058433" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058360" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058434" comment="python-xpcom190 less than 1.9.0.18-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3995</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3995" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via (1) crafted samples or (2) crafted instrument definitions in an Impulse Tracker file.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- c272b849dd8d75feb53cc6f743257e44 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060151" comment="libmikmod-32bit less than 3.1.11a-71.57.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060152" comment="libmikmod-64bit less than 3.1.11a-71.57.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060153" comment="libmikmod-devel less than 3.1.11a-71.57.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060154" comment="libmikmod less than 3.1.11a-71.57.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3996</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-3996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3996" source="CVE"/>
	<description>
	Heap-based buffer overflow in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via an Ultratracker file.
	</description>
 </metadata>
<!-- c272b849dd8d75feb53cc6f743257e44 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060151" comment="libmikmod-32bit less than 3.1.11a-71.57.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060152" comment="libmikmod-64bit less than 3.1.11a-71.57.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060153" comment="libmikmod-devel less than 3.1.11a-71.57.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060154" comment="libmikmod less than 3.1.11a-71.57.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4005</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4005" source="CVE"/>
	<description>
	The collect_rx_frame function in drivers/isdn/hisax/hfc_usb.c in the Linux kernel before 2.6.32-rc7 allows attackers to have an unspecified impact via a crafted HDLC packet that arrives over ISDN and triggers a buffer under-read.
	</description>
 </metadata>
<!-- 3830bdefa112876096e97d7864937bc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057211" comment="kernel-debug-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057212" comment="kernel-debug-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057213" comment="kernel-debug less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057214" comment="kernel-default-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057215" comment="kernel-default-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057216" comment="kernel-default less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057217" comment="kernel-docs less than 2.6.3-3.13.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057218" comment="kernel-kdump less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057219" comment="kernel-pae-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057220" comment="kernel-pae-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057221" comment="kernel-pae less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057222" comment="kernel-ppc64-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057223" comment="kernel-ppc64-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057224" comment="kernel-ppc64 less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057225" comment="kernel-ps3 less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057226" comment="kernel-source less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057227" comment="kernel-syms less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057228" comment="kernel-trace-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057229" comment="kernel-trace-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057230" comment="kernel-trace less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057231" comment="kernel-vanilla less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057232" comment="kernel-xen-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057233" comment="kernel-xen-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057234" comment="kernel-xen less than 2.6.27.42-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4009</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4009" source="CVE"/>
	<description>
	Buffer overflow in PowerDNS Recursor before 3.1.7.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted packets.
	</description>
 </metadata>
<!-- 978a02dabd909720c319ba98e691c925 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057909" comment="pdns-recursor less than 3.1.7-6.10.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4010</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4010" source="CVE"/>
	<description>
	Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones.
	</description>
 </metadata>
<!-- 978a02dabd909720c319ba98e691c925 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057909" comment="pdns-recursor less than 3.1.7-6.10.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4012</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4012" source="CVE"/>
	<description>
	Multiple integer overflows in LibThai before 0.1.13 might allow context-dependent attackers to execute arbitrary code via long strings that trigger heap-based buffer overflows, related to (1) thbrk/thbrk.c and (2) thwbrk/thwbrk.c.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- fec58df171cc71f8af1763e5afae9a8e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057630" comment="libthai-devel less than 0.1.9-9.33.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057631" comment="libthai less than 0.1.9-9.33.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4017</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4017" source="CVE"/>
	<description>
	PHP before 5.2.12 and 5.3.x before 5.3.1 does not restrict the number of temporary files created when handling a multipart/form-data POST request, which allows remote attackers to cause a denial of service (resource exhaustion), and makes it easier for remote attackers to exploit local file inclusion vulnerabilities, via multiple requests, related to lack of support for the max_file_uploads directive.
	</description>
 </metadata>
<!-- 051e60b1cd753810bd1e57e8fa1e5d07 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058185" comment="apache2-mod_php5 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058186" comment="php5-bcmath less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058187" comment="php5-bz2 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058188" comment="php5-calendar less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058189" comment="php5-ctype less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058190" comment="php5-curl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058191" comment="php5-dba less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058192" comment="php5-dbase less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058193" comment="php5-devel less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058194" comment="php5-dom less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058195" comment="php5-exif less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058196" comment="php5-fastcgi less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058197" comment="php5-ftp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058198" comment="php5-gd less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058199" comment="php5-gettext less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058200" comment="php5-gmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058201" comment="php5-hash less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058202" comment="php5-iconv less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058203" comment="php5-imap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058204" comment="php5-json less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058205" comment="php5-ldap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058206" comment="php5-mbstring less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058207" comment="php5-mcrypt less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058208" comment="php5-mysql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058209" comment="php5-ncurses less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058210" comment="php5-odbc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058211" comment="php5-openssl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058212" comment="php5-pcntl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058213" comment="php5-pdo less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058214" comment="php5-pear less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058215" comment="php5-pgsql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058216" comment="php5-posix less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058217" comment="php5-pspell less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058218" comment="php5-readline less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058219" comment="php5-shmop less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058220" comment="php5-snmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058221" comment="php5-soap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058222" comment="php5-sockets less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058223" comment="php5-sqlite less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058224" comment="php5-suhosin less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058225" comment="php5-sysvmsg less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058226" comment="php5-sysvsem less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058227" comment="php5-sysvshm less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058228" comment="php5-tidy less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058229" comment="php5-tokenizer less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058230" comment="php5-wddx less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058231" comment="php5-xmlreader less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058232" comment="php5-xmlrpc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058233" comment="php5-xmlwriter less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058234" comment="php5-xsl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058235" comment="php5-zip less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058236" comment="php5-zlib less than 5.2.12-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4019</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4019" source="CVE"/>
	<description>
	mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 12e230ba4d3ac5675fafc99e08709091 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060105" comment="libmysqlclient-devel less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060106" comment="libmysqlclient15-32bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060107" comment="libmysqlclient15-64bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060108" comment="libmysqlclient15 less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060109" comment="libmysqlclient_r15-32bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060110" comment="libmysqlclient_r15-64bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060111" comment="libmysqlclient_r15 less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060112" comment="mysql-Max less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060113" comment="mysql-bench less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060114" comment="mysql-client less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060115" comment="mysql-debug less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060116" comment="mysql-test less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060117" comment="mysql-tools less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060118" comment="mysql less than 5.0.67-12.17.7"/>
		</criteria>
	</criteria>
	<!-- 74ffcb3d975f99b39204a9a17088e978 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060119" comment="libmysqlclient-devel less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060120" comment="libmysqlclient15-32bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060121" comment="libmysqlclient15-64bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060122" comment="libmysqlclient15 less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060123" comment="libmysqlclient_r15-32bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060124" comment="libmysqlclient_r15-64bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060125" comment="libmysqlclient_r15 less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060126" comment="mysql-Max less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060127" comment="mysql-bench less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060128" comment="mysql-client less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060129" comment="mysql-debug less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060130" comment="mysql-test less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060131" comment="mysql-tools less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060132" comment="mysql less than 5.0.67-12.17.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4020</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4020" source="CVE"/>
	<description>
	Stack-based buffer overflow in the hfs subsystem in the Linux kernel 2.6.32 allows remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir function in fs/hfs/dir.c.
	</description>
 </metadata>
<!-- 3830bdefa112876096e97d7864937bc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057211" comment="kernel-debug-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057212" comment="kernel-debug-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057213" comment="kernel-debug less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057214" comment="kernel-default-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057215" comment="kernel-default-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057216" comment="kernel-default less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057217" comment="kernel-docs less than 2.6.3-3.13.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057218" comment="kernel-kdump less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057219" comment="kernel-pae-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057220" comment="kernel-pae-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057221" comment="kernel-pae less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057222" comment="kernel-ppc64-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057223" comment="kernel-ppc64-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057224" comment="kernel-ppc64 less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057225" comment="kernel-ps3 less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057226" comment="kernel-source less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057227" comment="kernel-syms less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057228" comment="kernel-trace-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057229" comment="kernel-trace-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057230" comment="kernel-trace less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057231" comment="kernel-vanilla less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057232" comment="kernel-xen-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057233" comment="kernel-xen-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057234" comment="kernel-xen less than 2.6.27.42-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4022</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022" source="CVE"/>
	<description>
	Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3035ae67700c7ab936e8b21caeb99807 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056469" comment="bind-chrootenv less than 9.5.0P2-18.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056470" comment="bind-devel less than 9.5.0P2-18.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056471" comment="bind-doc less than 9.5.0P2-18.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056472" comment="bind-libs-32bit less than 9.5.0P2-18.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056473" comment="bind-libs-64bit less than 9.5.0P2-18.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056474" comment="bind-libs less than 9.5.0P2-18.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056475" comment="bind-utils less than 9.5.0P2-18.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056476" comment="bind less than 9.5.0P2-18.8.1"/>
		</criteria>
	</criteria>
	<!-- 97713b441a49675416b27b3eed0fe6e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057458" comment="bind-chrootenv less than 9.5.0P2-18.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057459" comment="bind-devel less than 9.5.0P2-18.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057460" comment="bind-doc less than 9.5.0P2-18.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057461" comment="bind-libs-32bit less than 9.5.0P2-18.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057462" comment="bind-libs-64bit less than 9.5.0P2-18.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057463" comment="bind-libs less than 9.5.0P2-18.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057464" comment="bind-utils less than 9.5.0P2-18.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057465" comment="bind less than 9.5.0P2-18.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4023</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4023" source="CVE"/>
	<description>
	Argument injection vulnerability in the sendmail implementation of the Mail::Send method (Mail/sendmail.php) in the Mail package 1.1.14 for PEAR allows remote attackers to read and write arbitrary files via a crafted $from parameter, a different vector than CVE-2009-4111.
	</description>
 </metadata>
<!-- da1542a8da4edb611b8a8f60b44e0bf8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064012" comment="php5-pear-mail less than 1.1.14-1.135.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4028</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4028" source="CVE"/>
	<description>
	The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 12e230ba4d3ac5675fafc99e08709091 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060105" comment="libmysqlclient-devel less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060106" comment="libmysqlclient15-32bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060107" comment="libmysqlclient15-64bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060108" comment="libmysqlclient15 less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060109" comment="libmysqlclient_r15-32bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060110" comment="libmysqlclient_r15-64bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060111" comment="libmysqlclient_r15 less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060112" comment="mysql-Max less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060113" comment="mysql-bench less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060114" comment="mysql-client less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060115" comment="mysql-debug less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060116" comment="mysql-test less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060117" comment="mysql-tools less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060118" comment="mysql less than 5.0.67-12.17.7"/>
		</criteria>
	</criteria>
	<!-- 74ffcb3d975f99b39204a9a17088e978 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060119" comment="libmysqlclient-devel less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060120" comment="libmysqlclient15-32bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060121" comment="libmysqlclient15-64bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060122" comment="libmysqlclient15 less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060123" comment="libmysqlclient_r15-32bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060124" comment="libmysqlclient_r15-64bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060125" comment="libmysqlclient_r15 less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060126" comment="mysql-Max less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060127" comment="mysql-bench less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060128" comment="mysql-client less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060129" comment="mysql-debug less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060130" comment="mysql-test less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060131" comment="mysql-tools less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060132" comment="mysql less than 5.0.67-12.17.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4030</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4030" source="CVE"/>
	<description>
	MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 12e230ba4d3ac5675fafc99e08709091 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060105" comment="libmysqlclient-devel less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060106" comment="libmysqlclient15-32bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060107" comment="libmysqlclient15-64bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060108" comment="libmysqlclient15 less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060109" comment="libmysqlclient_r15-32bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060110" comment="libmysqlclient_r15-64bit less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060111" comment="libmysqlclient_r15 less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060112" comment="mysql-Max less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060113" comment="mysql-bench less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060114" comment="mysql-client less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060115" comment="mysql-debug less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060116" comment="mysql-test less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060117" comment="mysql-tools less than 5.0.67-12.17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060118" comment="mysql less than 5.0.67-12.17.7"/>
		</criteria>
	</criteria>
	<!-- 74ffcb3d975f99b39204a9a17088e978 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060119" comment="libmysqlclient-devel less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060120" comment="libmysqlclient15-32bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060121" comment="libmysqlclient15-64bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060122" comment="libmysqlclient15 less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060123" comment="libmysqlclient_r15-32bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060124" comment="libmysqlclient_r15-64bit less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060125" comment="libmysqlclient_r15 less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060126" comment="mysql-Max less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060127" comment="mysql-bench less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060128" comment="mysql-client less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060129" comment="mysql-debug less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060130" comment="mysql-test less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060131" comment="mysql-tools less than 5.0.67-12.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060132" comment="mysql less than 5.0.67-12.17.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4034</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4034" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4034" source="CVE"/>
	<description>
	PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based PostgreSQL servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended client-hostname restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- 525ed99dde8b46293eb0ecfa04651841 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057276" comment="postgresql-contrib less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057333" comment="postgresql-devel less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057277" comment="postgresql-docs less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057278" comment="postgresql-libs-32bit less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057334" comment="postgresql-libs-64bit less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057280" comment="postgresql-libs less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057335" comment="postgresql-plperl less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057336" comment="postgresql-plpython less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057337" comment="postgresql-pltcl less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057281" comment="postgresql-server less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057282" comment="postgresql less than 8.3.9-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4035</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4035" source="CVE"/>
	<description>
	The FoFiType1::parse function in fofi/FoFiType1.cc in Xpdf 3.0.0, gpdf 2.8.2, kpdf in kdegraphics 3.3.1, and possibly other libraries and versions, does not check the return value of the getNextLine function, which allows context-dependent attackers to execute arbitrary code via a PDF file with a crafted Type 1 font that can produce a negative value, leading to a signed-to-unsigned integer conversion error and a buffer overflow.
	</description>
 </metadata>
<!-- 4483982df88e47790f164139758639ff -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057056" comment="libpoppler-devel less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057057" comment="libpoppler-doc less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057058" comment="libpoppler-glib-devel less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057059" comment="libpoppler-glib4 less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057060" comment="libpoppler-qt2 less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057061" comment="libpoppler-qt3-devel less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057062" comment="libpoppler-qt4-3 less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057063" comment="libpoppler-qt4-devel less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057064" comment="libpoppler4 less than 0.10.1-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057065" comment="poppler-tools less than 0.10.1-1.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4111</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4111" source="CVE"/>
	<description>
	Argument injection vulnerability in Mail/sendmail.php in the Mail package 1.1.14, 1.2.0b2, and possibly other versions for PEAR allows remote attackers to read and write arbitrary files via a crafted $recipients parameter, and possibly other parameters, a different vulnerability than CVE-2009-4023.
	</description>
 </metadata>
<!-- da1542a8da4edb611b8a8f60b44e0bf8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064012" comment="php5-pear-mail less than 1.1.14-1.135.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4136</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4136" source="CVE"/>
	<description>
	PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.
	</description>
 </metadata>
<!-- 525ed99dde8b46293eb0ecfa04651841 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057276" comment="postgresql-contrib less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057333" comment="postgresql-devel less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057277" comment="postgresql-docs less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057278" comment="postgresql-libs-32bit less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057334" comment="postgresql-libs-64bit less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057280" comment="postgresql-libs less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057335" comment="postgresql-plperl less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057336" comment="postgresql-plpython less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057337" comment="postgresql-pltcl less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057281" comment="postgresql-server less than 8.3.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057282" comment="postgresql less than 8.3.9-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4138</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4138" source="CVE"/>
	<description>
	drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.
	</description>
 </metadata>
<!-- 3830bdefa112876096e97d7864937bc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057211" comment="kernel-debug-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057212" comment="kernel-debug-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057213" comment="kernel-debug less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057214" comment="kernel-default-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057215" comment="kernel-default-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057216" comment="kernel-default less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057217" comment="kernel-docs less than 2.6.3-3.13.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057218" comment="kernel-kdump less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057219" comment="kernel-pae-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057220" comment="kernel-pae-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057221" comment="kernel-pae less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057222" comment="kernel-ppc64-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057223" comment="kernel-ppc64-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057224" comment="kernel-ppc64 less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057225" comment="kernel-ps3 less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057226" comment="kernel-source less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057227" comment="kernel-syms less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057228" comment="kernel-trace-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057229" comment="kernel-trace-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057230" comment="kernel-trace less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057231" comment="kernel-vanilla less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057232" comment="kernel-xen-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057233" comment="kernel-xen-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057234" comment="kernel-xen less than 2.6.27.42-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4142</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4142" source="CVE"/>
	<description>
	The htmlspecialchars function in PHP before 5.2.12 does not properly handle (1) overlong UTF-8 sequences, (2) invalid Shift_JIS sequences, and (3) invalid EUC-JP sequences, which allows remote attackers to conduct cross-site scripting (XSS) attacks by placing a crafted byte sequence before a special character.
	</description>
 </metadata>
<!-- 051e60b1cd753810bd1e57e8fa1e5d07 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058185" comment="apache2-mod_php5 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058186" comment="php5-bcmath less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058187" comment="php5-bz2 less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058188" comment="php5-calendar less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058189" comment="php5-ctype less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058190" comment="php5-curl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058191" comment="php5-dba less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058192" comment="php5-dbase less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058193" comment="php5-devel less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058194" comment="php5-dom less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058195" comment="php5-exif less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058196" comment="php5-fastcgi less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058197" comment="php5-ftp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058198" comment="php5-gd less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058199" comment="php5-gettext less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058200" comment="php5-gmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058201" comment="php5-hash less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058202" comment="php5-iconv less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058203" comment="php5-imap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058204" comment="php5-json less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058205" comment="php5-ldap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058206" comment="php5-mbstring less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058207" comment="php5-mcrypt less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058208" comment="php5-mysql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058209" comment="php5-ncurses less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058210" comment="php5-odbc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058211" comment="php5-openssl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058212" comment="php5-pcntl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058213" comment="php5-pdo less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058214" comment="php5-pear less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058215" comment="php5-pgsql less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058216" comment="php5-posix less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058217" comment="php5-pspell less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058218" comment="php5-readline less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058219" comment="php5-shmop less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058220" comment="php5-snmp less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058221" comment="php5-soap less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058222" comment="php5-sockets less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058223" comment="php5-sqlite less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058224" comment="php5-suhosin less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058225" comment="php5-sysvmsg less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058226" comment="php5-sysvsem less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058227" comment="php5-sysvshm less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058228" comment="php5-tidy less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058229" comment="php5-tokenizer less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058230" comment="php5-wddx less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058231" comment="php5-xmlreader less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058232" comment="php5-xmlrpc less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058233" comment="php5-xmlwriter less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058234" comment="php5-xsl less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058235" comment="php5-zip less than 5.2.12-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058236" comment="php5-zlib less than 5.2.12-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4144</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4144" source="CVE"/>
	<description>
	NetworkManager (NM) 0.7.2 does not ensure that the configured Certification Authority (CA) certificate file for a (1) WPA Enterprise or (2) 802.1x network remains present upon a connection attempt, which might allow remote attackers to obtain sensitive information or cause a denial of service (connectivity disruption) by spoofing the identity of a wireless network.
	</description>
 </metadata>
<!-- 9087eabeec74919402b9c8cd2c46e6de -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057633" comment="NetworkManager-gnome less than 0.7.0.r1053-11.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4145</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4145" source="CVE"/>
	<description>
	nm-connection-editor in NetworkManager (NM) 0.7.x exports connection objects over D-Bus upon actions in the connection editor GUI, which allows local users to obtain sensitive information by reading D-Bus signals, as demonstrated by using dbus-monitor to discover the password for the WiFi network.
	</description>
 </metadata>
<!-- 9087eabeec74919402b9c8cd2c46e6de -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057633" comment="NetworkManager-gnome less than 0.7.0.r1053-11.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4212</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212" source="CVE"/>
	<description>
	Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.
	</description>
 </metadata>
<!-- c3f00622573f678ec6905accc33e53b4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057366" comment="krb5-32bit less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057367" comment="krb5-64bit less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057368" comment="krb5-apps-clients less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057369" comment="krb5-apps-servers less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057370" comment="krb5-client less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057371" comment="krb5-devel-32bit less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057372" comment="krb5-devel-64bit less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057373" comment="krb5-devel less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057374" comment="krb5-server less than 1.6.3-132.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057375" comment="krb5 less than 1.6.3-132.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4214</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4214" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb.
	</description>
 </metadata>
<!-- 0bfaefbdb6c0ab07ac0ab7a691cdb5d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058550" comment="rubygem-actionpack-2_1 less than 2.1.1-2.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058551" comment="rubygem-actionpack less than 2.1.1-2.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4270</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270" source="CVE"/>
	<description>
	Stack-based buffer overflow in the errprintf function in base/gsmisc.c in ghostscript 8.64 through 8.70 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file, as originally reported for debug logging code in gdevcups.c in the CUPS output driver.
	</description>
 </metadata>
<!-- 742167e27a88dcad3263fc988ddf988e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061932" comment="ghostscript-devel less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061933" comment="ghostscript-fonts-other less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061934" comment="ghostscript-fonts-rus less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061935" comment="ghostscript-fonts-std less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061936" comment="ghostscript-ijs-devel less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061937" comment="ghostscript-library less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061938" comment="ghostscript-omni less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061939" comment="ghostscript-x11 less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061940" comment="libgimpprint-devel less than 4.2.7-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061941" comment="libgimpprint less than 4.2.7-31.44.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4274</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274" source="CVE"/>
	<description>
	Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
	</description>
 </metadata>
<!-- f163ac675d1517e1d7c5f27bfe9ff37f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058607" comment="libnetpbm-devel less than 10.26.44-98.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058608" comment="libnetpbm10-32bit less than 10.26.44-98.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058609" comment="libnetpbm10-64bit less than 10.26.44-98.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058610" comment="libnetpbm10 less than 10.26.44-98.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058611" comment="netpbm less than 10.26.44-98.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4297</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4297" source="CVE"/>
	<description>
	Multiple cross-site request forgery (CSRF) vulnerabilities in Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors.
	</description>
 </metadata>
<!-- cf7a99382d35000afd76c255a9f52d5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057852" comment="moodle-af less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057853" comment="moodle-ar less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057854" comment="moodle-be less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057855" comment="moodle-bg less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057856" comment="moodle-bs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057857" comment="moodle-ca less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057858" comment="moodle-cs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057859" comment="moodle-da less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057860" comment="moodle-de less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057861" comment="moodle-de_du less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057862" comment="moodle-el less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057863" comment="moodle-es less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057864" comment="moodle-et less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057865" comment="moodle-eu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057866" comment="moodle-fa less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057867" comment="moodle-fi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057868" comment="moodle-fr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057869" comment="moodle-ga less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057870" comment="moodle-gl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057871" comment="moodle-he less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057872" comment="moodle-hi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057873" comment="moodle-hr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057874" comment="moodle-hu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057875" comment="moodle-id less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057876" comment="moodle-is less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057877" comment="moodle-it less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057878" comment="moodle-ja less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057879" comment="moodle-ka less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057880" comment="moodle-km less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057881" comment="moodle-kn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057882" comment="moodle-ko less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057883" comment="moodle-lt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057884" comment="moodle-lv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057885" comment="moodle-mi_tn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057886" comment="moodle-ms less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057887" comment="moodle-nl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057888" comment="moodle-nn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057889" comment="moodle-no less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057890" comment="moodle-pl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057891" comment="moodle-pt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057892" comment="moodle-ro less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057893" comment="moodle-ru less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057894" comment="moodle-sk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057895" comment="moodle-sl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057896" comment="moodle-so less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057897" comment="moodle-sq less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057898" comment="moodle-sr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057899" comment="moodle-sv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057900" comment="moodle-th less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057901" comment="moodle-tl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057902" comment="moodle-tr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057903" comment="moodle-uk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057904" comment="moodle-vi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057905" comment="moodle-zh_cn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057906" comment="moodle less than 1.9.7-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4298</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4298" source="CVE"/>
	<description>
	The LAMS module (mod/lams) for Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 stores the (1) username, (2) firstname, and (3) lastname fields within the user table, which allows attackers to obtain user account information via unknown vectors.
	</description>
 </metadata>
<!-- cf7a99382d35000afd76c255a9f52d5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057852" comment="moodle-af less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057853" comment="moodle-ar less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057854" comment="moodle-be less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057855" comment="moodle-bg less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057856" comment="moodle-bs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057857" comment="moodle-ca less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057858" comment="moodle-cs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057859" comment="moodle-da less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057860" comment="moodle-de less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057861" comment="moodle-de_du less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057862" comment="moodle-el less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057863" comment="moodle-es less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057864" comment="moodle-et less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057865" comment="moodle-eu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057866" comment="moodle-fa less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057867" comment="moodle-fi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057868" comment="moodle-fr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057869" comment="moodle-ga less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057870" comment="moodle-gl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057871" comment="moodle-he less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057872" comment="moodle-hi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057873" comment="moodle-hr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057874" comment="moodle-hu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057875" comment="moodle-id less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057876" comment="moodle-is less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057877" comment="moodle-it less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057878" comment="moodle-ja less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057879" comment="moodle-ka less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057880" comment="moodle-km less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057881" comment="moodle-kn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057882" comment="moodle-ko less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057883" comment="moodle-lt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057884" comment="moodle-lv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057885" comment="moodle-mi_tn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057886" comment="moodle-ms less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057887" comment="moodle-nl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057888" comment="moodle-nn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057889" comment="moodle-no less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057890" comment="moodle-pl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057891" comment="moodle-pt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057892" comment="moodle-ro less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057893" comment="moodle-ru less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057894" comment="moodle-sk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057895" comment="moodle-sl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057896" comment="moodle-so less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057897" comment="moodle-sq less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057898" comment="moodle-sr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057899" comment="moodle-sv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057900" comment="moodle-th less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057901" comment="moodle-tl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057902" comment="moodle-tr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057903" comment="moodle-uk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057904" comment="moodle-vi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057905" comment="moodle-zh_cn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057906" comment="moodle less than 1.9.7-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4299</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4299" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4299" source="CVE"/>
	<description>
	mod/glossary/showentry.php in the Glossary module for Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 does not properly perform access control, which allows attackers to read unauthorized Glossary entries via unknown vectors.
	</description>
 </metadata>
<!-- cf7a99382d35000afd76c255a9f52d5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057852" comment="moodle-af less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057853" comment="moodle-ar less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057854" comment="moodle-be less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057855" comment="moodle-bg less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057856" comment="moodle-bs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057857" comment="moodle-ca less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057858" comment="moodle-cs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057859" comment="moodle-da less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057860" comment="moodle-de less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057861" comment="moodle-de_du less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057862" comment="moodle-el less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057863" comment="moodle-es less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057864" comment="moodle-et less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057865" comment="moodle-eu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057866" comment="moodle-fa less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057867" comment="moodle-fi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057868" comment="moodle-fr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057869" comment="moodle-ga less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057870" comment="moodle-gl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057871" comment="moodle-he less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057872" comment="moodle-hi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057873" comment="moodle-hr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057874" comment="moodle-hu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057875" comment="moodle-id less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057876" comment="moodle-is less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057877" comment="moodle-it less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057878" comment="moodle-ja less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057879" comment="moodle-ka less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057880" comment="moodle-km less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057881" comment="moodle-kn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057882" comment="moodle-ko less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057883" comment="moodle-lt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057884" comment="moodle-lv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057885" comment="moodle-mi_tn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057886" comment="moodle-ms less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057887" comment="moodle-nl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057888" comment="moodle-nn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057889" comment="moodle-no less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057890" comment="moodle-pl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057891" comment="moodle-pt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057892" comment="moodle-ro less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057893" comment="moodle-ru less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057894" comment="moodle-sk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057895" comment="moodle-sl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057896" comment="moodle-so less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057897" comment="moodle-sq less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057898" comment="moodle-sr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057899" comment="moodle-sv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057900" comment="moodle-th less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057901" comment="moodle-tl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057902" comment="moodle-tr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057903" comment="moodle-uk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057904" comment="moodle-vi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057905" comment="moodle-zh_cn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057906" comment="moodle less than 1.9.7-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4300</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4300" source="CVE"/>
	<description>
	Multiple unspecified authentication plugins in Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 store the MD5 hashes for passwords in the user table, even when the cached hashes are not used by the plugin, which might make it easier for attackers to obtain credentials via unspecified vectors.
	</description>
 </metadata>
<!-- cf7a99382d35000afd76c255a9f52d5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057852" comment="moodle-af less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057853" comment="moodle-ar less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057854" comment="moodle-be less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057855" comment="moodle-bg less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057856" comment="moodle-bs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057857" comment="moodle-ca less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057858" comment="moodle-cs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057859" comment="moodle-da less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057860" comment="moodle-de less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057861" comment="moodle-de_du less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057862" comment="moodle-el less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057863" comment="moodle-es less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057864" comment="moodle-et less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057865" comment="moodle-eu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057866" comment="moodle-fa less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057867" comment="moodle-fi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057868" comment="moodle-fr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057869" comment="moodle-ga less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057870" comment="moodle-gl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057871" comment="moodle-he less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057872" comment="moodle-hi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057873" comment="moodle-hr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057874" comment="moodle-hu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057875" comment="moodle-id less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057876" comment="moodle-is less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057877" comment="moodle-it less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057878" comment="moodle-ja less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057879" comment="moodle-ka less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057880" comment="moodle-km less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057881" comment="moodle-kn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057882" comment="moodle-ko less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057883" comment="moodle-lt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057884" comment="moodle-lv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057885" comment="moodle-mi_tn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057886" comment="moodle-ms less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057887" comment="moodle-nl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057888" comment="moodle-nn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057889" comment="moodle-no less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057890" comment="moodle-pl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057891" comment="moodle-pt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057892" comment="moodle-ro less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057893" comment="moodle-ru less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057894" comment="moodle-sk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057895" comment="moodle-sl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057896" comment="moodle-so less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057897" comment="moodle-sq less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057898" comment="moodle-sr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057899" comment="moodle-sv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057900" comment="moodle-th less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057901" comment="moodle-tl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057902" comment="moodle-tr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057903" comment="moodle-uk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057904" comment="moodle-vi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057905" comment="moodle-zh_cn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057906" comment="moodle less than 1.9.7-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4301</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4301" source="CVE"/>
	<description>
	mnet/lib.php in Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7, when MNET services are enabled, does not properly check permissions, which allows remote authenticated servers to execute arbitrary MNET functions.
	</description>
 </metadata>
<!-- cf7a99382d35000afd76c255a9f52d5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057852" comment="moodle-af less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057853" comment="moodle-ar less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057854" comment="moodle-be less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057855" comment="moodle-bg less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057856" comment="moodle-bs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057857" comment="moodle-ca less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057858" comment="moodle-cs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057859" comment="moodle-da less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057860" comment="moodle-de less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057861" comment="moodle-de_du less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057862" comment="moodle-el less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057863" comment="moodle-es less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057864" comment="moodle-et less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057865" comment="moodle-eu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057866" comment="moodle-fa less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057867" comment="moodle-fi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057868" comment="moodle-fr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057869" comment="moodle-ga less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057870" comment="moodle-gl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057871" comment="moodle-he less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057872" comment="moodle-hi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057873" comment="moodle-hr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057874" comment="moodle-hu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057875" comment="moodle-id less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057876" comment="moodle-is less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057877" comment="moodle-it less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057878" comment="moodle-ja less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057879" comment="moodle-ka less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057880" comment="moodle-km less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057881" comment="moodle-kn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057882" comment="moodle-ko less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057883" comment="moodle-lt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057884" comment="moodle-lv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057885" comment="moodle-mi_tn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057886" comment="moodle-ms less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057887" comment="moodle-nl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057888" comment="moodle-nn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057889" comment="moodle-no less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057890" comment="moodle-pl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057891" comment="moodle-pt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057892" comment="moodle-ro less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057893" comment="moodle-ru less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057894" comment="moodle-sk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057895" comment="moodle-sl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057896" comment="moodle-so less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057897" comment="moodle-sq less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057898" comment="moodle-sr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057899" comment="moodle-sv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057900" comment="moodle-th less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057901" comment="moodle-tl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057902" comment="moodle-tr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057903" comment="moodle-uk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057904" comment="moodle-vi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057905" comment="moodle-zh_cn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057906" comment="moodle less than 1.9.7-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4302</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4302" source="CVE"/>
	<description>
	login/index_form.html in Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 links to an index page on the HTTP port even when the page is served from an HTTPS port, which might cause login credentials to be sent in cleartext, even when SSL is intended, and allows remote attackers to obtain these credentials by sniffing.
	</description>
 </metadata>
<!-- cf7a99382d35000afd76c255a9f52d5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057852" comment="moodle-af less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057853" comment="moodle-ar less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057854" comment="moodle-be less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057855" comment="moodle-bg less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057856" comment="moodle-bs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057857" comment="moodle-ca less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057858" comment="moodle-cs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057859" comment="moodle-da less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057860" comment="moodle-de less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057861" comment="moodle-de_du less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057862" comment="moodle-el less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057863" comment="moodle-es less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057864" comment="moodle-et less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057865" comment="moodle-eu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057866" comment="moodle-fa less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057867" comment="moodle-fi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057868" comment="moodle-fr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057869" comment="moodle-ga less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057870" comment="moodle-gl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057871" comment="moodle-he less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057872" comment="moodle-hi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057873" comment="moodle-hr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057874" comment="moodle-hu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057875" comment="moodle-id less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057876" comment="moodle-is less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057877" comment="moodle-it less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057878" comment="moodle-ja less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057879" comment="moodle-ka less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057880" comment="moodle-km less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057881" comment="moodle-kn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057882" comment="moodle-ko less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057883" comment="moodle-lt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057884" comment="moodle-lv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057885" comment="moodle-mi_tn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057886" comment="moodle-ms less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057887" comment="moodle-nl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057888" comment="moodle-nn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057889" comment="moodle-no less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057890" comment="moodle-pl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057891" comment="moodle-pt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057892" comment="moodle-ro less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057893" comment="moodle-ru less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057894" comment="moodle-sk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057895" comment="moodle-sl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057896" comment="moodle-so less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057897" comment="moodle-sq less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057898" comment="moodle-sr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057899" comment="moodle-sv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057900" comment="moodle-th less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057901" comment="moodle-tl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057902" comment="moodle-tr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057903" comment="moodle-uk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057904" comment="moodle-vi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057905" comment="moodle-zh_cn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057906" comment="moodle less than 1.9.7-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4303</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4303" source="CVE"/>
	<description>
	Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 stores (1) password hashes and (2) unspecified "secrets" in backup files, which might allow attackers to obtain sensitive information.
	</description>
 </metadata>
<!-- cf7a99382d35000afd76c255a9f52d5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057852" comment="moodle-af less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057853" comment="moodle-ar less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057854" comment="moodle-be less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057855" comment="moodle-bg less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057856" comment="moodle-bs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057857" comment="moodle-ca less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057858" comment="moodle-cs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057859" comment="moodle-da less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057860" comment="moodle-de less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057861" comment="moodle-de_du less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057862" comment="moodle-el less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057863" comment="moodle-es less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057864" comment="moodle-et less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057865" comment="moodle-eu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057866" comment="moodle-fa less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057867" comment="moodle-fi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057868" comment="moodle-fr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057869" comment="moodle-ga less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057870" comment="moodle-gl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057871" comment="moodle-he less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057872" comment="moodle-hi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057873" comment="moodle-hr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057874" comment="moodle-hu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057875" comment="moodle-id less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057876" comment="moodle-is less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057877" comment="moodle-it less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057878" comment="moodle-ja less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057879" comment="moodle-ka less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057880" comment="moodle-km less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057881" comment="moodle-kn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057882" comment="moodle-ko less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057883" comment="moodle-lt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057884" comment="moodle-lv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057885" comment="moodle-mi_tn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057886" comment="moodle-ms less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057887" comment="moodle-nl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057888" comment="moodle-nn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057889" comment="moodle-no less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057890" comment="moodle-pl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057891" comment="moodle-pt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057892" comment="moodle-ro less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057893" comment="moodle-ru less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057894" comment="moodle-sk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057895" comment="moodle-sl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057896" comment="moodle-so less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057897" comment="moodle-sq less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057898" comment="moodle-sr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057899" comment="moodle-sv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057900" comment="moodle-th less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057901" comment="moodle-tl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057902" comment="moodle-tr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057903" comment="moodle-uk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057904" comment="moodle-vi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057905" comment="moodle-zh_cn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057906" comment="moodle less than 1.9.7-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4304</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4304" source="CVE"/>
	<description>
	Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 does not use a random password salt in config.php, which makes it easier for attackers to conduct brute-force password guessing attacks.
	</description>
 </metadata>
<!-- cf7a99382d35000afd76c255a9f52d5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057852" comment="moodle-af less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057853" comment="moodle-ar less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057854" comment="moodle-be less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057855" comment="moodle-bg less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057856" comment="moodle-bs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057857" comment="moodle-ca less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057858" comment="moodle-cs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057859" comment="moodle-da less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057860" comment="moodle-de less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057861" comment="moodle-de_du less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057862" comment="moodle-el less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057863" comment="moodle-es less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057864" comment="moodle-et less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057865" comment="moodle-eu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057866" comment="moodle-fa less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057867" comment="moodle-fi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057868" comment="moodle-fr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057869" comment="moodle-ga less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057870" comment="moodle-gl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057871" comment="moodle-he less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057872" comment="moodle-hi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057873" comment="moodle-hr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057874" comment="moodle-hu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057875" comment="moodle-id less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057876" comment="moodle-is less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057877" comment="moodle-it less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057878" comment="moodle-ja less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057879" comment="moodle-ka less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057880" comment="moodle-km less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057881" comment="moodle-kn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057882" comment="moodle-ko less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057883" comment="moodle-lt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057884" comment="moodle-lv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057885" comment="moodle-mi_tn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057886" comment="moodle-ms less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057887" comment="moodle-nl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057888" comment="moodle-nn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057889" comment="moodle-no less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057890" comment="moodle-pl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057891" comment="moodle-pt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057892" comment="moodle-ro less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057893" comment="moodle-ru less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057894" comment="moodle-sk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057895" comment="moodle-sl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057896" comment="moodle-so less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057897" comment="moodle-sq less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057898" comment="moodle-sr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057899" comment="moodle-sv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057900" comment="moodle-th less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057901" comment="moodle-tl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057902" comment="moodle-tr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057903" comment="moodle-uk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057904" comment="moodle-vi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057905" comment="moodle-zh_cn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057906" comment="moodle less than 1.9.7-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4305</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4305" source="CVE"/>
	<description>
	SQL injection vulnerability in the SCORM module in Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 allows remote authenticated users to execute arbitrary SQL commands via vectors related to an "escaping issue when processing AICC CRS file (Course_Title)."
	</description>
 </metadata>
<!-- cf7a99382d35000afd76c255a9f52d5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057852" comment="moodle-af less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057853" comment="moodle-ar less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057854" comment="moodle-be less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057855" comment="moodle-bg less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057856" comment="moodle-bs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057857" comment="moodle-ca less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057858" comment="moodle-cs less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057859" comment="moodle-da less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057860" comment="moodle-de less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057861" comment="moodle-de_du less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057862" comment="moodle-el less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057863" comment="moodle-es less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057864" comment="moodle-et less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057865" comment="moodle-eu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057866" comment="moodle-fa less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057867" comment="moodle-fi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057868" comment="moodle-fr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057869" comment="moodle-ga less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057870" comment="moodle-gl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057871" comment="moodle-he less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057872" comment="moodle-hi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057873" comment="moodle-hr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057874" comment="moodle-hu less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057875" comment="moodle-id less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057876" comment="moodle-is less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057877" comment="moodle-it less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057878" comment="moodle-ja less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057879" comment="moodle-ka less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057880" comment="moodle-km less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057881" comment="moodle-kn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057882" comment="moodle-ko less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057883" comment="moodle-lt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057884" comment="moodle-lv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057885" comment="moodle-mi_tn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057886" comment="moodle-ms less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057887" comment="moodle-nl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057888" comment="moodle-nn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057889" comment="moodle-no less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057890" comment="moodle-pl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057891" comment="moodle-pt less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057892" comment="moodle-ro less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057893" comment="moodle-ru less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057894" comment="moodle-sk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057895" comment="moodle-sl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057896" comment="moodle-so less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057897" comment="moodle-sq less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057898" comment="moodle-sr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057899" comment="moodle-sv less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057900" comment="moodle-th less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057901" comment="moodle-tl less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057902" comment="moodle-tr less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057903" comment="moodle-uk less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057904" comment="moodle-vi less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057905" comment="moodle-zh_cn less than 1.9.7-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057906" comment="moodle less than 1.9.7-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4307</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4307" source="CVE"/>
	<description>
	The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 2.6.32-git6 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and panic) via a malformed ext4 filesystem containing a super block with a large FLEX_BG group size (aka s_log_groups_per_flex value).
	</description>
 </metadata>
<!-- 3830bdefa112876096e97d7864937bc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057211" comment="kernel-debug-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057212" comment="kernel-debug-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057213" comment="kernel-debug less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057214" comment="kernel-default-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057215" comment="kernel-default-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057216" comment="kernel-default less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057217" comment="kernel-docs less than 2.6.3-3.13.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057218" comment="kernel-kdump less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057219" comment="kernel-pae-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057220" comment="kernel-pae-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057221" comment="kernel-pae less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057222" comment="kernel-ppc64-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057223" comment="kernel-ppc64-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057224" comment="kernel-ppc64 less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057225" comment="kernel-ps3 less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057226" comment="kernel-source less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057227" comment="kernel-syms less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057228" comment="kernel-trace-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057229" comment="kernel-trace-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057230" comment="kernel-trace less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057231" comment="kernel-vanilla less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057232" comment="kernel-xen-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057233" comment="kernel-xen-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057234" comment="kernel-xen less than 2.6.27.42-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4308</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4308" source="CVE"/>
	<description>
	The ext4_decode_error function in fs/ext4/super.c in the ext4 filesystem in the Linux kernel before 2.6.32 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference), and possibly have unspecified other impact, via a crafted read-only filesystem that lacks a journal.
	</description>
 </metadata>
<!-- 3830bdefa112876096e97d7864937bc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057211" comment="kernel-debug-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057212" comment="kernel-debug-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057213" comment="kernel-debug less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057214" comment="kernel-default-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057215" comment="kernel-default-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057216" comment="kernel-default less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057217" comment="kernel-docs less than 2.6.3-3.13.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057218" comment="kernel-kdump less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057219" comment="kernel-pae-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057220" comment="kernel-pae-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057221" comment="kernel-pae less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057222" comment="kernel-ppc64-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057223" comment="kernel-ppc64-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057224" comment="kernel-ppc64 less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057225" comment="kernel-ps3 less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057226" comment="kernel-source less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057227" comment="kernel-syms less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057228" comment="kernel-trace-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057229" comment="kernel-trace-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057230" comment="kernel-trace less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057231" comment="kernel-vanilla less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057232" comment="kernel-xen-base less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057233" comment="kernel-xen-extra less than 2.6.27.42-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057234" comment="kernel-xen less than 2.6.27.42-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4324</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324" source="CVE"/>
	<description>
	Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
	</description>
 </metadata>
<!-- cce6f950d887c9dbc2a539986dfc1a53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4355</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4355" source="CVE"/>
	<description>
	Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678.
	</description>
 </metadata>
<!-- 1915c5a071fe3232134ef53a4a42aba0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057475" comment="libopenssl-devel less than 0.9.8h-28.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057476" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057477" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057478" comment="libopenssl0_9_8 less than 0.9.8h-28.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057479" comment="openssl-doc less than 0.9.8h-28.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057480" comment="openssl less than 0.9.8h-28.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4376</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4376" source="CVE"/>
	<description>
	Buffer overflow in the daintree_sna_read function in the Daintree SNA file parser in Wireshark 1.2.0 through 1.2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
	</description>
 </metadata>
<!-- 57e7b64bcac302bbc9cfacbb58f14860 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058910" comment="wireshark-devel less than 1.0.4-2.14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058911" comment="wireshark less than 1.0.4-2.14.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4377</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4377" source="CVE"/>
	<description>
	The (1) SMB and (2) SMB2 dissectors in Wireshark 0.9.0 through 1.2.4 allow remote attackers to cause a denial of service (crash) via a crafted packet that triggers a NULL pointer dereference, as demonstrated by fuzz-2009-12-07-11141.pcap.
	</description>
 </metadata>
<!-- 57e7b64bcac302bbc9cfacbb58f14860 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058910" comment="wireshark-devel less than 1.0.4-2.14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058911" comment="wireshark less than 1.0.4-2.14.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4411</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4411" source="CVE"/>
	<description>
	The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.
	</description>
 </metadata>
<!-- b6a9313e49b43726b07c7c0404de0ff8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057640" comment="acl less than 2.2.47-27.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057641" comment="libacl-32bit less than 2.2.47-27.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057642" comment="libacl-64bit less than 2.2.47-27.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057643" comment="libacl-devel less than 2.2.47-27.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057644" comment="libacl less than 2.2.47-27.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4536</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4536" source="CVE"/>
	<description>
	drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3830bdefa112876096e97d7864937bc9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057211" comment="kernel-debug-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057212" comment="kernel-debug-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057213" comment="kernel-debug less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057214" comment="kernel-default-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057215" comment="kernel-default-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057216" comment="kernel-default less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057217" comment="kernel-docs less than 2.6.3-3.13.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057218" comment="kernel-kdump less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057219" comment="kernel-pae-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057220" comment="kernel-pae-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057221" comment="kernel-pae less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057222" comment="kernel-ppc64-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057223" comment="kernel-ppc64-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057224" comment="kernel-ppc64 less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057225" comment="kernel-ps3 less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057226" comment="kernel-source less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057227" comment="kernel-syms less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057228" comment="kernel-trace-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057229" comment="kernel-trace-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057230" comment="kernel-trace less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057231" comment="kernel-vanilla less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057232" comment="kernel-xen-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057233" comment="kernel-xen-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057234" comment="kernel-xen less than 2.6.27.42-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c86a1b7090754b33393ccb19a5f82147 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058516" comment="kernel-debug-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058517" comment="kernel-debug-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058518" comment="kernel-debug less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058492" comment="kernel-default-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058512" comment="kernel-default-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058493" comment="kernel-default less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058519" comment="kernel-docs less than 2.6.3-3.13.89"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058507" comment="kernel-kdump less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058501" comment="kernel-pae-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058515" comment="kernel-pae-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058502" comment="kernel-pae less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058508" comment="kernel-ppc64-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058520" comment="kernel-ppc64-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058509" comment="kernel-ppc64 less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058521" comment="kernel-ps3 less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058494" comment="kernel-source less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058495" comment="kernel-syms less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058522" comment="kernel-trace-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058523" comment="kernel-trace-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058524" comment="kernel-trace less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058525" comment="kernel-vanilla less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058497" comment="kernel-xen-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058513" comment="kernel-xen-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058498" comment="kernel-xen less than 2.6.27.45-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4537</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4537" source="CVE"/>
	<description>
	drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing '\0' characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.
	</description>
 </metadata>
<!-- 574a4c9c3e74805d1c0c29cf29aa4953 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061671" comment="kernel-debug-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061672" comment="kernel-debug-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061673" comment="kernel-debug less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061674" comment="kernel-default-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061675" comment="kernel-default-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061676" comment="kernel-default less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061677" comment="kernel-docs less than 2.6.3-3.13.109"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061678" comment="kernel-kdump less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061679" comment="kernel-pae-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061680" comment="kernel-pae-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061681" comment="kernel-pae less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061682" comment="kernel-ppc64-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061683" comment="kernel-ppc64-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061684" comment="kernel-ppc64 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061685" comment="kernel-ps3 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061686" comment="kernel-source less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061687" comment="kernel-syms less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061688" comment="kernel-trace-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061689" comment="kernel-trace-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061690" comment="kernel-trace less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061691" comment="kernel-vanilla less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061692" comment="kernel-xen-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061693" comment="kernel-xen-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061694" comment="kernel-xen less than 2.6.27.48-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4538</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4538" source="CVE"/>
	<description>
	drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3830bdefa112876096e97d7864937bc9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057211" comment="kernel-debug-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057212" comment="kernel-debug-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057213" comment="kernel-debug less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057214" comment="kernel-default-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057215" comment="kernel-default-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057216" comment="kernel-default less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057217" comment="kernel-docs less than 2.6.3-3.13.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057218" comment="kernel-kdump less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057219" comment="kernel-pae-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057220" comment="kernel-pae-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057221" comment="kernel-pae less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057222" comment="kernel-ppc64-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057223" comment="kernel-ppc64-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057224" comment="kernel-ppc64 less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057225" comment="kernel-ps3 less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057226" comment="kernel-source less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057227" comment="kernel-syms less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057228" comment="kernel-trace-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057229" comment="kernel-trace-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057230" comment="kernel-trace less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057231" comment="kernel-vanilla less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057232" comment="kernel-xen-base less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057233" comment="kernel-xen-extra less than 2.6.27.42-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057234" comment="kernel-xen less than 2.6.27.42-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c86a1b7090754b33393ccb19a5f82147 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058516" comment="kernel-debug-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058517" comment="kernel-debug-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058518" comment="kernel-debug less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058492" comment="kernel-default-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058512" comment="kernel-default-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058493" comment="kernel-default less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058519" comment="kernel-docs less than 2.6.3-3.13.89"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058507" comment="kernel-kdump less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058501" comment="kernel-pae-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058515" comment="kernel-pae-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058502" comment="kernel-pae less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058508" comment="kernel-ppc64-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058520" comment="kernel-ppc64-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058509" comment="kernel-ppc64 less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058521" comment="kernel-ps3 less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058494" comment="kernel-source less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058495" comment="kernel-syms less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058522" comment="kernel-trace-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058523" comment="kernel-trace-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058524" comment="kernel-trace less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058525" comment="kernel-vanilla less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058497" comment="kernel-xen-base less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058513" comment="kernel-xen-extra less than 2.6.27.45-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058498" comment="kernel-xen less than 2.6.27.45-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4565</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4565" source="CVE"/>
	<description>
	sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- 361e9df33357edcf562a3d490ac5e2de -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058480" comment="rmail less than 8.14.3-50.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058481" comment="sendmail-devel less than 8.14.3-50.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058482" comment="sendmail less than 8.14.3-50.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4895</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4895" source="CVE"/>
	<description>
	Race condition in the tty_fasync function in drivers/char/tty_io.c in the Linux kernel before 2.6.32.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via unknown vectors, related to the put_tty_queue and __f_setown functions.  NOTE: the vulnerability was addressed in a different way in 2.6.32.9.
	</description>
 </metadata>
<!-- 574a4c9c3e74805d1c0c29cf29aa4953 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061671" comment="kernel-debug-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061672" comment="kernel-debug-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061673" comment="kernel-debug less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061674" comment="kernel-default-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061675" comment="kernel-default-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061676" comment="kernel-default less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061677" comment="kernel-docs less than 2.6.3-3.13.109"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061678" comment="kernel-kdump less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061679" comment="kernel-pae-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061680" comment="kernel-pae-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061681" comment="kernel-pae less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061682" comment="kernel-ppc64-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061683" comment="kernel-ppc64-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061684" comment="kernel-ppc64 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061685" comment="kernel-ps3 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061686" comment="kernel-source less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061687" comment="kernel-syms less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061688" comment="kernel-trace-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061689" comment="kernel-trace-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061690" comment="kernel-trace less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061691" comment="kernel-vanilla less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061692" comment="kernel-xen-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061693" comment="kernel-xen-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061694" comment="kernel-xen less than 2.6.27.48-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4897</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2009-4897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4897" source="CVE"/>
	<description>
	Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document containing a long name.
	</description>
 </metadata>
<!-- 742167e27a88dcad3263fc988ddf988e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061932" comment="ghostscript-devel less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061933" comment="ghostscript-fonts-other less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061934" comment="ghostscript-fonts-rus less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061935" comment="ghostscript-fonts-std less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061936" comment="ghostscript-ijs-devel less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061937" comment="ghostscript-library less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061938" comment="ghostscript-omni less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061939" comment="ghostscript-x11 less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061940" comment="libgimpprint-devel less than 4.2.7-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061941" comment="libgimpprint less than 4.2.7-31.44.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0001</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001" source="CVE"/>
	<description>
	Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
	</description>
 </metadata>
<!-- cf2b0afd8f6b10f16eb564f537758acb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057454" comment="gzip less than 1.3.12-68.39.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0003</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0003" source="CVE"/>
	<description>
	The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and might allow local users to cause a denial of service (system slowdown or crash) by jumping to an address.
	</description>
 </metadata>
<!-- c86a1b7090754b33393ccb19a5f82147 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058516" comment="kernel-debug-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058517" comment="kernel-debug-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058518" comment="kernel-debug less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058492" comment="kernel-default-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058512" comment="kernel-default-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058493" comment="kernel-default less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058519" comment="kernel-docs less than 2.6.3-3.13.89"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058507" comment="kernel-kdump less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058501" comment="kernel-pae-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058515" comment="kernel-pae-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058502" comment="kernel-pae less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058508" comment="kernel-ppc64-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058520" comment="kernel-ppc64-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058509" comment="kernel-ppc64 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058521" comment="kernel-ps3 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058494" comment="kernel-source less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058495" comment="kernel-syms less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058522" comment="kernel-trace-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058523" comment="kernel-trace-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058524" comment="kernel-trace less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058525" comment="kernel-vanilla less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058497" comment="kernel-xen-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058513" comment="kernel-xen-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058498" comment="kernel-xen less than 2.6.27.45-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0007</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0007" source="CVE"/>
	<description>
	net/bridge/netfilter/ebtables.c in the ebtables module in the netfilter framework in the Linux kernel before 2.6.33-rc4 does not require the CAP_NET_ADMIN capability for setting or modifying rules, which allows local users to bypass intended access restrictions and configure arbitrary network-traffic filtering via a modified ebtables application.
	</description>
 </metadata>
<!-- c86a1b7090754b33393ccb19a5f82147 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058516" comment="kernel-debug-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058517" comment="kernel-debug-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058518" comment="kernel-debug less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058492" comment="kernel-default-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058512" comment="kernel-default-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058493" comment="kernel-default less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058519" comment="kernel-docs less than 2.6.3-3.13.89"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058507" comment="kernel-kdump less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058501" comment="kernel-pae-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058515" comment="kernel-pae-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058502" comment="kernel-pae less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058508" comment="kernel-ppc64-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058520" comment="kernel-ppc64-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058509" comment="kernel-ppc64 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058521" comment="kernel-ps3 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058494" comment="kernel-source less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058495" comment="kernel-syms less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058522" comment="kernel-trace-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058523" comment="kernel-trace-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058524" comment="kernel-trace less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058525" comment="kernel-vanilla less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058497" comment="kernel-xen-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058513" comment="kernel-xen-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058498" comment="kernel-xen less than 2.6.27.45-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0012</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0012" source="CVE"/>
	<description>
	Directory traversal vulnerability in libtransmission/metainfo.c in Transmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a pathname within a .torrent file.
	</description>
 </metadata>
<!-- f765e0443654ec8e8bc6efba5d2ceca3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057410" comment="transmission-gtk less than 1.34-1.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057411" comment="transmission-lang less than 1.34-1.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057412" comment="transmission less than 1.34-1.32.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0013</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0013" source="CVE"/>
	<description>
	Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122.  NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.
	</description>
 </metadata>
<!-- a886bdab004076b032a70da00a4ae29b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058562" comment="finch-devel less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058563" comment="finch less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058564" comment="libpurple-devel less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058565" comment="libpurple-lang less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058566" comment="libpurple-meanwhile less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058567" comment="libpurple-mono less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058568" comment="libpurple less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058569" comment="pidgin-devel less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058570" comment="pidgin less than 2.6.6-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0015</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0015" source="CVE"/>
	<description>
	nis/nss_nis/nis-pwd.c in the GNU C Library (aka glibc or libc6) 2.7 and Embedded GLIBC (EGLIBC) 2.10.2 adds information from the passwd.adjunct.byname map to entries in the passwd map, which allows remote attackers to obtain the encrypted passwords of NIS accounts by calling the getpwnam function.
	</description>
 </metadata>
<!-- 7f2cb38ab30086b2e83a460f9fab3881 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063995" comment="glibc-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063996" comment="glibc-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063997" comment="glibc-devel-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063998" comment="glibc-devel-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063999" comment="glibc-devel less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064000" comment="glibc-html less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064001" comment="glibc-i18ndata less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064002" comment="glibc-info less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064003" comment="glibc-locale-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064004" comment="glibc-locale-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064005" comment="glibc-locale less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064006" comment="glibc-obsolete less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064007" comment="glibc-profile-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064008" comment="glibc-profile-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064009" comment="glibc-profile less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064010" comment="glibc less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064011" comment="nscd less than 2.9-2.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0082</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0082" source="CVE"/>
	<description>
	Unspecified vulnerability in the HotSpot Server component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0084</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0084" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0085</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0085" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0087</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0087" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start, Java Plug-in component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0088</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0088" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0089</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0089" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start, Java Plug-in component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect availability via unknown vectors.
	</description>
 </metadata>
<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0090</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0090" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start, Java Plug-in component in Oracle Java SE and Java for Business 6 Update 18 allows remote attackers to affect integrity and availability via unknown vectors.
	</description>
 </metadata>
<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0091</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0091" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0092</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0092" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, and 5.0 Update 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0093</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0093" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0094</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0094" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18 and 5.0 Update 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is due to missing privilege checks during deserialization of RMIConnectionImpl objects, which allows remote attackers to call system-level Java functions via the ClassLoader of a constructor that is being deserialized.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0095</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0095" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0097</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097" source="CVE"/>
	<description>
	ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta does not properly validate DNSSEC (1) NSEC and (2) NSEC3 records, which allows remote attackers to add the Authenticated Data (AD) flag to a forged NXDOMAIN response for an existing domain.
	</description>
 </metadata>
<!-- 97713b441a49675416b27b3eed0fe6e8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057458" comment="bind-chrootenv less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057459" comment="bind-devel less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057460" comment="bind-doc less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057461" comment="bind-libs-32bit less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057462" comment="bind-libs-64bit less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057463" comment="bind-libs less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057464" comment="bind-utils less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057465" comment="bind less than 9.5.0P2-18.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0098</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0098" source="CVE"/>
	<description>
	ClamAV before 0.96 does not properly handle the (1) CAB and (2) 7z file formats, which allows remote attackers to bypass virus detection via a crafted archive that is compatible with standard archive utilities.
	</description>
 </metadata>
<!-- 798ab0028cf2401c709977c57c07bc07 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059837" comment="clamav-db less than 0.96-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059838" comment="clamav less than 0.96-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0132</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0132" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in ViewVC 1.1 before 1.1.5 and 1.0 before 1.0.11, when the regular expression search functionality is enabled, allows remote attackers to inject arbitrary web script or HTML via vectors related to "search_re input," a different vulnerability than CVE-2010-0736.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 71794721b7e5e7cb2642c7ce25f4c5ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059522" comment="viewvc less than 1.0.11-0.2.1"/>
	</criteria>
	<!-- 732486202975a3d18d17f123a30beb20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059433" comment="viewvc less than 1.0.11-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0136</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0136" source="CVE"/>
	<description>
	OpenOffice.org (OOo) 2.0.4, 2.4.1, and 3.1.1 does not properly enforce Visual Basic for Applications (VBA) macro security settings, which allows remote attackers to run arbitrary macros via a crafted document.
	</description>
 </metadata>
<!-- 9aa2fb176579b8330d78ce7638e832eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058871" comment="OpenOffice_org-base-drivers-postgresql less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058872" comment="OpenOffice_org-gnome less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058873" comment="OpenOffice_org-kde less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058874" comment="OpenOffice_org-libs-core-devel less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058875" comment="OpenOffice_org-libs-core-l10n-prebuilt less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058876" comment="OpenOffice_org-libs-core less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058877" comment="OpenOffice_org-libs-extern-devel less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058878" comment="OpenOffice_org-libs-extern-l10n-prebuilt less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058879" comment="OpenOffice_org-libs-extern less than 3.0.0.9-1.15.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058880" comment="OpenOffice_org-libs-gui-devel less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058881" comment="OpenOffice_org-libs-gui-l10n-prebuilt less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058882" comment="OpenOffice_org-libs-gui less than 3.0.0.9-1.12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058883" comment="OpenOffice_org-mailmerge less than 3.0.0.9-1.11.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058884" comment="OpenOffice_org-math less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058885" comment="OpenOffice_org-writer-devel less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058886" comment="OpenOffice_org-writer-l10n-prebuilt less than 3.0.0.9-2.9.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058887" comment="OpenOffice_org-writer less than 3.0.0.9-2.9.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0156</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0156" source="CVE"/>
	<description>
	Puppet 0.24.x before 0.24.9 and 0.25.x before 0.25.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/daemonout, (2) /tmp/puppetdoc.txt, (3) /tmp/puppetdoc.tex, or (4) /tmp/puppetdoc.aux temporary file.
	</description>
 </metadata>
<!-- 5734d9b9086c74b5f7137ab0d0229107 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060823" comment="puppet-server less than 0.24.5-1.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060824" comment="puppet less than 0.24.5-1.32.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0159</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors.
	</description>
 </metadata>
<!-- 3fd814ddf2f9d7e6b55ab6b2edaa3afa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058425" comment="MozillaFirefox-branding-upstream less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058426" comment="MozillaFirefox-branding-upstream less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058427" comment="MozillaFirefox-translations less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058428" comment="MozillaFirefox-translations less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058429" comment="MozillaFirefox less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058430" comment="MozillaFirefox less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058358" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058431" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058432" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058359" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058433" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058360" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058434" comment="python-xpcom190 less than 1.9.0.18-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0160</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0160" source="CVE"/>
	<description>
	The Web Worker functionality in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly handle array data types for posted messages, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 3fd814ddf2f9d7e6b55ab6b2edaa3afa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058425" comment="MozillaFirefox-branding-upstream less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058426" comment="MozillaFirefox-branding-upstream less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058427" comment="MozillaFirefox-translations less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058428" comment="MozillaFirefox-translations less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058429" comment="MozillaFirefox less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058430" comment="MozillaFirefox less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058358" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058431" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058432" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058359" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058433" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058360" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058434" comment="python-xpcom190 less than 1.9.0.18-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0161</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0161" source="CVE"/>
	<description>
	The nsAuthSSPI::Unwrap function in extensions/auth/nsAuthSSPI.cpp in Mozilla Thunderbird before 2.0.0.24 and SeaMonkey before 1.1.19 on Windows Vista, Windows Server 2008 R2, and Windows 7 allows remote SMTP, IMAP, and POP servers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via crafted data in a session that uses SSPI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3911462b3f68f3f2a965113f5b360cd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059214" comment="MozillaThunderbird-devel less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059215" comment="MozillaThunderbird-translations less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059216" comment="MozillaThunderbird less than 2.0.0.24-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 905ae89bbd71f145a4b2ab6acdd1d659 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060701" comment="seamonkey-dom-inspector less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060702" comment="seamonkey-irc less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060703" comment="seamonkey-mail less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060704" comment="seamonkey-spellchecker less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060705" comment="seamonkey-venkman less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060706" comment="seamonkey less than 1.1.19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0162</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0162" source="CVE"/>
	<description>
	Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly support the application/octet-stream content type as a protection mechanism against execution of web script in certain circumstances involving SVG and the EMBED element, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via an embedded SVG document.
	</description>
 </metadata>
<!-- 3fd814ddf2f9d7e6b55ab6b2edaa3afa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058425" comment="MozillaFirefox-branding-upstream less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058426" comment="MozillaFirefox-branding-upstream less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058427" comment="MozillaFirefox-translations less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058428" comment="MozillaFirefox-translations less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058429" comment="MozillaFirefox less than 3.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058430" comment="MozillaFirefox less than 3.0.18-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058358" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058431" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058432" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058359" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058433" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058360" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058434" comment="python-xpcom190 less than 1.9.0.18-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0163</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0163" source="CVE"/>
	<description>
	Mozilla Thunderbird before 2.0.0.24 and SeaMonkey before 1.1.19 process e-mail attachments with a parser that performs casts and line termination incorrectly, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted message, related to message indexing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3911462b3f68f3f2a965113f5b360cd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059214" comment="MozillaThunderbird-devel less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059215" comment="MozillaThunderbird-translations less than 2.0.0.24-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059216" comment="MozillaThunderbird less than 2.0.0.24-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 905ae89bbd71f145a4b2ab6acdd1d659 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060701" comment="seamonkey-dom-inspector less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060702" comment="seamonkey-irc less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060703" comment="seamonkey-mail less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060704" comment="seamonkey-spellchecker less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060705" comment="seamonkey-venkman less than 1.1.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060706" comment="seamonkey less than 1.1.19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0173</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 346a49e9bb17a1f69b59369ffc7a7196 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059477" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059495" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059496" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059478" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059498" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059479" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059619" comment="python-xpcom190 less than 1.9.0.19-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 5fc9dc30115cae9ac4de2fbff8371b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059603" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059604" comment="MozillaFirefox-translations-common less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059605" comment="MozillaFirefox-translations-other less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059645" comment="autoconf213 less than 2.13-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059646" comment="beagle-devel less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059647" comment="beagle-epiphany less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059648" comment="beagle-evolution less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059649" comment="beagle-firefox less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059650" comment="beagle-google less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059651" comment="beagle-gui less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059652" comment="beagle-lang less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059653" comment="beagle-thunderbird less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059654" comment="beagle less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059655" comment="mhtml-firefox less than 0.5-1.27.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059484" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059500" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059501" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059485" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059606" comment="mozilla-xulrunner191-translations-common less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059607" comment="mozilla-xulrunner191-translations-other less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059608" comment="python-xpcom191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 991ebf790cba19d559ab1e15ccdc1096 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059656" comment="MozillaFirefox-branding-openSUSE less than 3.5-10.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0174</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0174" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 346a49e9bb17a1f69b59369ffc7a7196 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059477" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059495" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059496" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059478" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059498" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059479" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059619" comment="python-xpcom190 less than 1.9.0.19-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 5fc9dc30115cae9ac4de2fbff8371b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059603" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059604" comment="MozillaFirefox-translations-common less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059605" comment="MozillaFirefox-translations-other less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059645" comment="autoconf213 less than 2.13-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059646" comment="beagle-devel less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059647" comment="beagle-epiphany less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059648" comment="beagle-evolution less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059649" comment="beagle-firefox less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059650" comment="beagle-google less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059651" comment="beagle-gui less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059652" comment="beagle-lang less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059653" comment="beagle-thunderbird less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059654" comment="beagle less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059655" comment="mhtml-firefox less than 0.5-1.27.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059484" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059500" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059501" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059485" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059606" comment="mozilla-xulrunner191-translations-common less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059607" comment="mozilla-xulrunner191-translations-other less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059608" comment="python-xpcom191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 991ebf790cba19d559ab1e15ccdc1096 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059656" comment="MozillaFirefox-branding-openSUSE less than 3.5-10.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0175</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0175" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 346a49e9bb17a1f69b59369ffc7a7196 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059477" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059495" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059496" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059478" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059498" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059479" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059619" comment="python-xpcom190 less than 1.9.0.19-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 5fc9dc30115cae9ac4de2fbff8371b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059603" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059604" comment="MozillaFirefox-translations-common less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059605" comment="MozillaFirefox-translations-other less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059645" comment="autoconf213 less than 2.13-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059646" comment="beagle-devel less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059647" comment="beagle-epiphany less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059648" comment="beagle-evolution less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059649" comment="beagle-firefox less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059650" comment="beagle-google less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059651" comment="beagle-gui less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059652" comment="beagle-lang less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059653" comment="beagle-thunderbird less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059654" comment="beagle less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059655" comment="mhtml-firefox less than 0.5-1.27.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059484" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059500" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059501" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059485" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059606" comment="mozilla-xulrunner191-translations-common less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059607" comment="mozilla-xulrunner191-translations-other less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059608" comment="python-xpcom191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 991ebf790cba19d559ab1e15ccdc1096 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059656" comment="MozillaFirefox-branding-openSUSE less than 3.5-10.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0176</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 346a49e9bb17a1f69b59369ffc7a7196 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059477" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059495" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059496" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059478" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059498" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059479" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059619" comment="python-xpcom190 less than 1.9.0.19-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 5fc9dc30115cae9ac4de2fbff8371b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059603" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059604" comment="MozillaFirefox-translations-common less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059605" comment="MozillaFirefox-translations-other less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059645" comment="autoconf213 less than 2.13-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059646" comment="beagle-devel less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059647" comment="beagle-epiphany less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059648" comment="beagle-evolution less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059649" comment="beagle-firefox less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059650" comment="beagle-google less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059651" comment="beagle-gui less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059652" comment="beagle-lang less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059653" comment="beagle-thunderbird less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059654" comment="beagle less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059655" comment="mhtml-firefox less than 0.5-1.27.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059484" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059500" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059501" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059485" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059606" comment="mozilla-xulrunner191-translations-common less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059607" comment="mozilla-xulrunner191-translations-other less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059608" comment="python-xpcom191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 991ebf790cba19d559ab1e15ccdc1096 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059656" comment="MozillaFirefox-branding-openSUSE less than 3.5-10.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0177</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0177" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, frees the contents of the window.navigator.plugins array while a reference to an array element is still active, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 346a49e9bb17a1f69b59369ffc7a7196 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059477" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059495" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059496" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059478" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059498" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059479" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059619" comment="python-xpcom190 less than 1.9.0.19-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 5fc9dc30115cae9ac4de2fbff8371b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059603" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059604" comment="MozillaFirefox-translations-common less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059605" comment="MozillaFirefox-translations-other less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059645" comment="autoconf213 less than 2.13-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059646" comment="beagle-devel less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059647" comment="beagle-epiphany less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059648" comment="beagle-evolution less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059649" comment="beagle-firefox less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059650" comment="beagle-google less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059651" comment="beagle-gui less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059652" comment="beagle-lang less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059653" comment="beagle-thunderbird less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059654" comment="beagle less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059655" comment="mhtml-firefox less than 0.5-1.27.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059484" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059500" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059501" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059485" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059606" comment="mozilla-xulrunner191-translations-common less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059607" comment="mozilla-xulrunner191-translations-other less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059608" comment="python-xpcom191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 991ebf790cba19d559ab1e15ccdc1096 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059656" comment="MozillaFirefox-branding-openSUSE less than 3.5-10.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0178</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0178" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, does not prevent applets from interpreting mouse clicks as drag-and-drop actions, which allows remote attackers to execute arbitrary JavaScript with Chrome privileges by loading a chrome: URL and then loading a javascript: URL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 346a49e9bb17a1f69b59369ffc7a7196 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059477" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059495" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059496" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059478" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059498" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059479" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059619" comment="python-xpcom190 less than 1.9.0.19-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 5fc9dc30115cae9ac4de2fbff8371b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059603" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059604" comment="MozillaFirefox-translations-common less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059605" comment="MozillaFirefox-translations-other less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059645" comment="autoconf213 less than 2.13-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059646" comment="beagle-devel less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059647" comment="beagle-epiphany less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059648" comment="beagle-evolution less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059649" comment="beagle-firefox less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059650" comment="beagle-google less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059651" comment="beagle-gui less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059652" comment="beagle-lang less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059653" comment="beagle-thunderbird less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059654" comment="beagle less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059655" comment="mhtml-firefox less than 0.5-1.27.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059484" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059500" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059501" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059485" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059606" comment="mozilla-xulrunner191-translations-common less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059607" comment="mozilla-xulrunner191-translations-other less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059608" comment="python-xpcom191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 991ebf790cba19d559ab1e15ccdc1096 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059656" comment="MozillaFirefox-branding-openSUSE less than 3.5-10.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0179</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0179" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 346a49e9bb17a1f69b59369ffc7a7196 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059477" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059495" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059496" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059478" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059498" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059479" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059619" comment="python-xpcom190 less than 1.9.0.19-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 5fc9dc30115cae9ac4de2fbff8371b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059603" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059604" comment="MozillaFirefox-translations-common less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059605" comment="MozillaFirefox-translations-other less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059645" comment="autoconf213 less than 2.13-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059646" comment="beagle-devel less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059647" comment="beagle-epiphany less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059648" comment="beagle-evolution less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059649" comment="beagle-firefox less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059650" comment="beagle-google less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059651" comment="beagle-gui less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059652" comment="beagle-lang less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059653" comment="beagle-thunderbird less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059654" comment="beagle less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059655" comment="mhtml-firefox less than 0.5-1.27.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059484" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059500" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059501" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059485" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059606" comment="mozilla-xulrunner191-translations-common less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059607" comment="mozilla-xulrunner191-translations-other less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059608" comment="python-xpcom191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 991ebf790cba19d559ab1e15ccdc1096 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059656" comment="MozillaFirefox-branding-openSUSE less than 3.5-10.1.1"/>
	</criteria>
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0181</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0181" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, executes a mail application in situations where an IMG element has a SRC attribute that is a redirect to a mailto: URL, which allows remote attackers to cause a denial of service (excessive application launches) via an HTML document with many images.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 346a49e9bb17a1f69b59369ffc7a7196 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059477" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059495" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059496" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059478" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059498" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059479" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059619" comment="python-xpcom190 less than 1.9.0.19-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 5fc9dc30115cae9ac4de2fbff8371b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059603" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059604" comment="MozillaFirefox-translations-common less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059605" comment="MozillaFirefox-translations-other less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059645" comment="autoconf213 less than 2.13-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059646" comment="beagle-devel less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059647" comment="beagle-epiphany less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059648" comment="beagle-evolution less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059649" comment="beagle-firefox less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059650" comment="beagle-google less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059651" comment="beagle-gui less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059652" comment="beagle-lang less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059653" comment="beagle-thunderbird less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059654" comment="beagle less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059655" comment="mhtml-firefox less than 0.5-1.27.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059484" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059500" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059501" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059485" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059606" comment="mozilla-xulrunner191-translations-common less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059607" comment="mozilla-xulrunner191-translations-other less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059608" comment="python-xpcom191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 991ebf790cba19d559ab1e15ccdc1096 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059656" comment="MozillaFirefox-branding-openSUSE less than 3.5-10.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0182</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182" source="CVE"/>
	<description>
	The XMLDocument::load function in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 does not perform the expected nsIContentPolicy checks during loading of content by XML documents, which allows attackers to bypass intended access restrictions via crafted content.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 346a49e9bb17a1f69b59369ffc7a7196 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059477" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059495" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059496" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059478" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059498" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059479" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059619" comment="python-xpcom190 less than 1.9.0.19-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 5fc9dc30115cae9ac4de2fbff8371b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059603" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059604" comment="MozillaFirefox-translations-common less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059605" comment="MozillaFirefox-translations-other less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059483" comment="MozillaFirefox less than 3.5.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059645" comment="autoconf213 less than 2.13-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059646" comment="beagle-devel less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059647" comment="beagle-epiphany less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059648" comment="beagle-evolution less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059649" comment="beagle-firefox less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059650" comment="beagle-google less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059651" comment="beagle-gui less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059652" comment="beagle-lang less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059653" comment="beagle-thunderbird less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059654" comment="beagle less than 0.3.8-46.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059655" comment="mhtml-firefox less than 0.5-1.27.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059484" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059500" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059501" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059485" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059606" comment="mozilla-xulrunner191-translations-common less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059607" comment="mozilla-xulrunner191-translations-other less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059488" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059608" comment="python-xpcom191 less than 1.9.1.9-1.1.1"/>
		</criteria>
	</criteria>
	<!-- 991ebf790cba19d559ab1e15ccdc1096 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059656" comment="MozillaFirefox-branding-openSUSE less than 3.5-10.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0183</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0183" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsCycleCollector::MarkRoots function in Mozilla Firefox 3.5.x before 3.5.10 and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a crafted HTML document, related to an improper frame construction process for menus.
	</description>
 </metadata>
<!-- 53b9f1d7a183738f7384e1ca35aa996b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061221" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061222" comment="MozillaFirefox-translations-common less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061223" comment="MozillaFirefox-translations-other less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061224" comment="MozillaFirefox less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061225" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061226" comment="mozilla-xulrunner191-devel less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061227" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061228" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061229" comment="mozilla-xulrunner191-translations-common less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061230" comment="mozilla-xulrunner191-translations-other less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061231" comment="mozilla-xulrunner191 less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061232" comment="python-xpcom191 less than 1.9.1.10-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0186</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186" source="CVE"/>
	<description>
	Cross-domain vulnerability in Adobe Flash Player before 10.0.45.2, Adobe AIR before 1.5.3.9130, and Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows remote attackers to bypass intended sandbox restrictions and make cross-domain requests via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 11ea9f3ea7285181a551af10eb577e71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057994" comment="flash-player less than 10.0.45.2-0.1.1"/>
	</criteria>
	<!-- 7ec0a11cdc6c3eae820cd46c576761b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058543" comment="acroread-cmaps less than 9.3.1-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058544" comment="acroread-fonts-ja less than 9.3.1-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058545" comment="acroread-fonts-ko less than 9.3.1-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058546" comment="acroread-fonts-zh_CN less than 9.3.1-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058547" comment="acroread-fonts-zh_TW less than 9.3.1-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058548" comment="acroread less than 9.3.1-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0187</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0187" source="CVE"/>
	<description>
	Adobe Flash Player before 10.0.45.2 and Adobe AIR before 1.5.3.9130 allow remote attackers to cause a denial of service (application crash) via a modified SWF file.
	</description>
 </metadata>
<!-- 11ea9f3ea7285181a551af10eb577e71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057994" comment="flash-player less than 10.0.45.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0188</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 7ec0a11cdc6c3eae820cd46c576761b0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058543" comment="acroread-cmaps less than 9.3.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058544" comment="acroread-fonts-ja less than 9.3.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058545" comment="acroread-fonts-ko less than 9.3.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058546" comment="acroread-fonts-zh_CN less than 9.3.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058547" comment="acroread-fonts-zh_TW less than 9.3.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058548" comment="acroread less than 9.3.1-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0190</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0190" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0191</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0191" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified vectors, related to a "prefix protocol handler vulnerability."
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0192</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0192" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0193 and CVE-2010-0196.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0193</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0193" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0192 and CVE-2010-0196.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0194</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0194" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0197, CVE-2010-0201, and CVE-2010-0204.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0195</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0195" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, do not properly handle fonts, which allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0196</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0196" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0192 and CVE-2010-0193.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0197</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0197" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0194, CVE-2010-0201, and CVE-2010-0204.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0198</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0198" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0199, CVE-2010-0202, and CVE-2010-0203.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0199</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0199" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0202, and CVE-2010-0203.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0201</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0201" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0194, CVE-2010-0197, and CVE-2010-0204.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0202</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0202" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0199, and CVE-2010-0203.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0203</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0203" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0199, and CVE-2010-0202.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0204</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0204" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0194, CVE-2010-0197, and CVE-2010-0201.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0205</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205" source="CVE"/>
	<description>
	The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.
	</description>
 </metadata>
<!-- 17fd27153f1fc495c9813980fd4f0a2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060577" comment="libpng-devel-32bit less than 1.2.31-4.39.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060578" comment="libpng-devel-64bit less than 1.2.31-4.39.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060579" comment="libpng-devel less than 1.2.31-4.39.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060580" comment="libpng12-0-32bit less than 1.2.31-4.39.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060581" comment="libpng12-0-64bit less than 1.2.31-4.39.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060582" comment="libpng12-0 less than 1.2.31-4.39.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060583" comment="libpng3 less than 1.2.31-4.39.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0209</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0209" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2213, CVE-2010-2214, and CVE-2010-2216.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6dc0f226897e2807f0d495db198a2c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- cf42df06792fbc140654995f11bbcd1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062172" comment="acroread-cmaps less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062173" comment="acroread-fonts-ja less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062174" comment="acroread-fonts-ko less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062175" comment="acroread-fonts-zh_CN less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062176" comment="acroread-fonts-zh_TW less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062177" comment="acroread less than 9.3.4-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0211</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0211" source="CVE"/>
	<description>
	The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
	</description>
 </metadata>
<!-- 831ae47ae1402bb0b8b9727b23825a45 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062094" comment="libldap-2_4-2-32bit less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062095" comment="libldap-2_4-2-64bit less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062096" comment="libldap-2_4-2 less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062097" comment="openldap2-back-meta less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062098" comment="openldap2-back-perl less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062099" comment="openldap2-client less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062100" comment="openldap2-devel-32bit less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062101" comment="openldap2-devel-64bit less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062102" comment="openldap2-devel less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062103" comment="openldap2 less than 2.4.12-5.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0212</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0212" source="CVE"/>
	<description>
	OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.
	</description>
 </metadata>
<!-- 831ae47ae1402bb0b8b9727b23825a45 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062094" comment="libldap-2_4-2-32bit less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062095" comment="libldap-2_4-2-64bit less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062096" comment="libldap-2_4-2 less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062097" comment="openldap2-back-meta less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062098" comment="openldap2-back-perl less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062099" comment="openldap2-client less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062100" comment="openldap2-devel-32bit less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062101" comment="openldap2-devel-64bit less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062102" comment="openldap2-devel less than 2.4.12-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062103" comment="openldap2 less than 2.4.12-5.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0220</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0220" source="CVE"/>
	<description>
	The nsObserverList::FillObserverArray function in xpcom/ds/nsObserverList.cpp in Mozilla Firefox before 3.5.7 allows remote attackers to cause a denial of service (application crash) via a crafted web site that triggers memory consumption and an accompanying Low Memory alert dialog, and also triggers attempted removal of an observer from an empty observers array.
	</description>
 </metadata>
<!-- b04bab26d5032d6ebaf5024421d826fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057683" comment="MozillaFirefox-branding-upstream less than 3.0.17-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057684" comment="MozillaFirefox-translations less than 3.0.17-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057685" comment="MozillaFirefox less than 3.0.17-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057537" comment="mozilla-xulrunner190-32bit less than 1.9.0.17-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057655" comment="mozilla-xulrunner190-devel less than 1.9.0.17-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057656" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.17-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057538" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.17-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057658" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.17-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057539" comment="mozilla-xulrunner190-translations less than 1.9.0.17-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057541" comment="mozilla-xulrunner190 less than 1.9.0.17-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057686" comment="python-xpcom190 less than 1.9.0.17-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0277</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277" source="CVE"/>
	<description>
	slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.6, including 2.6.4, and Adium 1.3.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed MSNSLP INVITE request in an SLP message, a different issue than CVE-2010-0013.
	</description>
 </metadata>
<!-- a886bdab004076b032a70da00a4ae29b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058562" comment="finch-devel less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058563" comment="finch less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058564" comment="libpurple-devel less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058565" comment="libpurple-lang less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058566" comment="libpurple-meanwhile less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058567" comment="libpurple-mono less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058568" comment="libpurple less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058569" comment="pidgin-devel less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058570" comment="pidgin less than 2.6.6-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0285</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0285" source="CVE"/>
	<description>
	gnome-screensaver 2.14.3, 2.22.2, 2.27.x, 2.28.0, and 2.28.3, when the X configuration enables the extend screen option, allows physically proximate attackers to bypass screen locking, access an unattended workstation, and view half of the GNOME desktop by attaching an external monitor.
	</description>
 </metadata>
<!-- cf53b00cff05fa21bb959201b4ec56cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057953" comment="gnome-screensaver-lang less than 2.24.0-7.9.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057954" comment="gnome-screensaver less than 2.24.0-7.9.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0290</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0290" source="CVE"/>
	<description>
	Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022.
	</description>
 </metadata>
<!-- 97713b441a49675416b27b3eed0fe6e8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057458" comment="bind-chrootenv less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057459" comment="bind-devel less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057460" comment="bind-doc less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057461" comment="bind-libs-32bit less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057462" comment="bind-libs-64bit less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057463" comment="bind-libs less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057464" comment="bind-utils less than 9.5.0P2-18.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057465" comment="bind less than 9.5.0P2-18.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0295</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0295" source="CVE"/>
	<description>
	lighttpd before 1.4.26, and 1.5.x, allocates a buffer for each read operation that occurs for a request, which allows remote attackers to cause a denial of service (memory consumption) by breaking a request into small pieces that are sent at a slow rate.
	</description>
 </metadata>
<!-- 2c33df8045f4e05722a110a934be7946 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057752" comment="lighttpd-mod_cml less than 1.4.20-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057753" comment="lighttpd-mod_magnet less than 1.4.20-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057754" comment="lighttpd-mod_mysql_vhost less than 1.4.20-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057755" comment="lighttpd-mod_rrdtool less than 1.4.20-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057756" comment="lighttpd-mod_trigger_b4_dl less than 1.4.20-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057757" comment="lighttpd-mod_webdav less than 1.4.20-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057758" comment="lighttpd less than 1.4.20-2.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0296</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296" source="CVE"/>
	<description>
	The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mount options and gain privileges, via a crafted mount request.
	</description>
 </metadata>
<!-- 7f2cb38ab30086b2e83a460f9fab3881 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063995" comment="glibc-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063996" comment="glibc-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063997" comment="glibc-devel-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063998" comment="glibc-devel-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063999" comment="glibc-devel less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064000" comment="glibc-html less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064001" comment="glibc-i18ndata less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064002" comment="glibc-info less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064003" comment="glibc-locale-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064004" comment="glibc-locale-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064005" comment="glibc-locale less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064006" comment="glibc-obsolete less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064007" comment="glibc-profile-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064008" comment="glibc-profile-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064009" comment="glibc-profile less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064010" comment="glibc less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064011" comment="nscd less than 2.9-2.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0302</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0302" source="CVE"/>
	<description>
	Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553.
	</description>
 </metadata>
<!-- e1ef8955282f1a32cf0d3c4a50d75a32 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059005" comment="cups-client less than 1.3.9-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059006" comment="cups-devel less than 1.3.9-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059007" comment="cups-libs-32bit less than 1.3.9-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059008" comment="cups-libs-64bit less than 1.3.9-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059009" comment="cups-libs less than 1.3.9-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059010" comment="cups less than 1.3.9-7.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0304</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0304" source="CVE"/>
	<description>
	Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allow remote attackers to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function.
	</description>
 </metadata>
<!-- 57e7b64bcac302bbc9cfacbb58f14860 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058910" comment="wireshark-devel less than 1.0.4-2.14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058911" comment="wireshark less than 1.0.4-2.14.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0307</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0307" source="CVE"/>
	<description>
	The load_elf_binary function in fs/binfmt_elf.c in the Linux kernel before 2.6.32.8 on the x86_64 platform does not ensure that the ELF interpreter is available before a call to the SET_PERSONALITY macro, which allows local users to cause a denial of service (system crash) via a 32-bit application that attempts to execute a 64-bit application and then triggers a segmentation fault, as demonstrated by amd64_killer, related to the flush_old_exec function.
	</description>
 </metadata>
<!-- c86a1b7090754b33393ccb19a5f82147 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058516" comment="kernel-debug-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058517" comment="kernel-debug-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058518" comment="kernel-debug less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058492" comment="kernel-default-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058512" comment="kernel-default-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058493" comment="kernel-default less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058519" comment="kernel-docs less than 2.6.3-3.13.89"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058507" comment="kernel-kdump less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058501" comment="kernel-pae-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058515" comment="kernel-pae-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058502" comment="kernel-pae less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058508" comment="kernel-ppc64-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058520" comment="kernel-ppc64-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058509" comment="kernel-ppc64 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058521" comment="kernel-ps3 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058494" comment="kernel-source less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058495" comment="kernel-syms less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058522" comment="kernel-trace-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058523" comment="kernel-trace-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058524" comment="kernel-trace less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058525" comment="kernel-vanilla less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058497" comment="kernel-xen-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058513" comment="kernel-xen-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058498" comment="kernel-xen less than 2.6.27.45-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0308</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0308" source="CVE"/>
	<description>
	lib/rfc1035.c in Squid 2.x, 3.0 through 3.0.STABLE22, and 3.1 through 3.1.0.15 allows remote attackers to cause a denial of service (assertion failure) via a crafted DNS packet that only contains a header.
	</description>
 </metadata>
<!-- 70ac0a790fa150209a81f8b3b175d02f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059069" comment="squid-beta less than 3.0-438.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059070" comment="squid3 less than 3.0.STABLE10-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059071" comment="squid less than 2.7.STABLE5-1.21.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0393</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393" source="CVE"/>
	<description>
	The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable to determine the file that provides localized message strings, which allows local users to gain privileges via a file that contains crafted localization data with format string specifiers.
	</description>
 </metadata>
<!-- e1ef8955282f1a32cf0d3c4a50d75a32 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059005" comment="cups-client less than 1.3.9-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059006" comment="cups-devel less than 1.3.9-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059007" comment="cups-libs-32bit less than 1.3.9-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059008" comment="cups-libs-64bit less than 1.3.9-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059009" comment="cups-libs less than 1.3.9-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059010" comment="cups less than 1.3.9-7.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0395</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0395" source="CVE"/>
	<description>
	OpenOffice.org 2.x and 3.0 before 3.2.1 allows user-assisted remote attackers to bypass Python macro security restrictions and execute arbitrary Python code via a crafted OpenDocument Text (ODT) file that triggers code execution when the macro directory structure is previewed.
	</description>
 </metadata>
<!-- ac05c17895a618fc357b8b6714ea283a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061558" comment="OpenOffice_org-base-drivers-postgresql less than 3.0.0.9-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061559" comment="OpenOffice_org-gnome less than 3.0.0.9-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061560" comment="OpenOffice_org-kde less than 3.0.0.9-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061561" comment="OpenOffice_org-libs-core-devel less than 3.0.0.9-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061562" comment="OpenOffice_org-libs-core-l10n-prebuilt less than 3.0.0.9-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061563" comment="OpenOffice_org-libs-core less than 3.0.0.9-1.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061564" comment="OpenOffice_org-mailmerge less than 3.0.0.9-1.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0397</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0397" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0397" source="CVE"/>
	<description>
	The xmlrpc extension in PHP 5.3.1 does not properly handle a missing methodName element in the first argument to the xmlrpc_decode_request function, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly have unspecified other impact via a crafted argument.
	</description>
 </metadata>
<!-- f7736dbe8c645481215da0eefa926d29 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060586" comment="apache2-mod_php5 less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060587" comment="php5-bcmath less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060588" comment="php5-bz2 less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060589" comment="php5-calendar less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060590" comment="php5-ctype less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060591" comment="php5-curl less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060592" comment="php5-dba less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060593" comment="php5-dbase less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060594" comment="php5-devel less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060595" comment="php5-dom less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060596" comment="php5-exif less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060597" comment="php5-fastcgi less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060598" comment="php5-ftp less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060599" comment="php5-gd less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060600" comment="php5-gettext less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060601" comment="php5-gmp less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060602" comment="php5-hash less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060603" comment="php5-iconv less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060604" comment="php5-imap less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060605" comment="php5-json less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060606" comment="php5-ldap less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060607" comment="php5-mbstring less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060608" comment="php5-mcrypt less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060609" comment="php5-mysql less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060610" comment="php5-ncurses less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060611" comment="php5-odbc less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060612" comment="php5-openssl less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060613" comment="php5-pcntl less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060614" comment="php5-pdo less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060615" comment="php5-pear less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060616" comment="php5-pgsql less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060617" comment="php5-posix less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060618" comment="php5-pspell less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060619" comment="php5-readline less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060620" comment="php5-shmop less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060621" comment="php5-snmp less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060622" comment="php5-soap less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060623" comment="php5-sockets less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060624" comment="php5-sqlite less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060625" comment="php5-suhosin less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060626" comment="php5-sysvmsg less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060627" comment="php5-sysvsem less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060628" comment="php5-sysvshm less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060629" comment="php5-tidy less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060630" comment="php5-tokenizer less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060631" comment="php5-wddx less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060632" comment="php5-xmlreader less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060633" comment="php5-xmlrpc less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060634" comment="php5-xmlwriter less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060635" comment="php5-xsl less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060636" comment="php5-zip less than 5.2.13-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060637" comment="php5-zlib less than 5.2.13-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0405</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405" source="CVE"/>
	<description>
	Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
	</description>
 </metadata>
<!-- e407d6748749e6e6024e5bb37c13be0e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063229" comment="bzip2-doc less than 1.0.5-34.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063230" comment="bzip2 less than 1.0.5-34.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063231" comment="libbz2-1-32bit less than 1.0.5-34.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063232" comment="libbz2-1-64bit less than 1.0.5-34.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063233" comment="libbz2-1 less than 1.0.5-34.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063234" comment="libbz2-devel less than 1.0.5-34.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0407</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0407" source="CVE"/>
	<description>
	Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
	</description>
 </metadata>
<!-- 10ddd63980948313ba67de140db1c99d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062683" comment="pcsc-lite-32bit less than 1.4.102-1.249.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062684" comment="pcsc-lite-64bit less than 1.4.102-1.249.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062685" comment="pcsc-lite-devel less than 1.4.102-1.249.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062686" comment="pcsc-lite less than 1.4.102-1.249.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0408</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408" source="CVE"/>
	<description>
	The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
	</description>
 </metadata>
<!-- f7fcabaa2eeb8dc603b7487bf3bf2e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059956" comment="apache2-devel less than 2.2.10-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059957" comment="apache2-doc less than 2.2.10-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059958" comment="apache2-example-pages less than 2.2.10-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059959" comment="apache2-prefork less than 2.2.10-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059960" comment="apache2-utils less than 2.2.10-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059961" comment="apache2-worker less than 2.2.10-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059962" comment="apache2 less than 2.2.10-2.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0409</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0409" source="CVE"/>
	<description>
	Buffer overflow in the GMIME_UUENCODE_LEN macro in gmime/gmime-encodings.h in GMime before 2.4.15 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via input data for a uuencode operation.
	</description>
 </metadata>
<!-- aa472469a7bc4521f8e4ab2337d9a38f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058463" comment="gmime-devel less than 2.2.23-1.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058464" comment="gmime-doc less than 2.2.23-1.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058465" comment="gmime-sharp less than 2.2.23-1.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058466" comment="gmime less than 2.2.23-1.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058467" comment="libgmime-2_0-3 less than 2.2.23-1.31.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0410</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0410" source="CVE"/>
	<description>
	drivers/connector/connector.c in the Linux kernel before 2.6.32.8 allows local users to cause a denial of service (memory consumption and system crash) by sending the kernel many NETLINK_CONNECTOR messages.
	</description>
 </metadata>
<!-- c86a1b7090754b33393ccb19a5f82147 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058516" comment="kernel-debug-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058517" comment="kernel-debug-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058518" comment="kernel-debug less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058492" comment="kernel-default-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058512" comment="kernel-default-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058493" comment="kernel-default less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058519" comment="kernel-docs less than 2.6.3-3.13.89"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058507" comment="kernel-kdump less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058501" comment="kernel-pae-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058515" comment="kernel-pae-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058502" comment="kernel-pae less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058508" comment="kernel-ppc64-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058520" comment="kernel-ppc64-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058509" comment="kernel-ppc64 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058521" comment="kernel-ps3 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058494" comment="kernel-source less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058495" comment="kernel-syms less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058522" comment="kernel-trace-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058523" comment="kernel-trace-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058524" comment="kernel-trace less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058525" comment="kernel-vanilla less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058497" comment="kernel-xen-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058513" comment="kernel-xen-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058498" comment="kernel-xen less than 2.6.27.45-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0415</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0415" source="CVE"/>
	<description>
	The do_pages_move function in mm/migrate.c in the Linux kernel before 2.6.33-rc7 does not validate node values, which allows local users to read arbitrary kernel memory locations, cause a denial of service (OOPS), and possibly have unspecified other impact by specifying a node that is not part of the kernel's node set.
	</description>
 </metadata>
<!-- c86a1b7090754b33393ccb19a5f82147 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058516" comment="kernel-debug-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058517" comment="kernel-debug-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058518" comment="kernel-debug less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058492" comment="kernel-default-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058512" comment="kernel-default-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058493" comment="kernel-default less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058519" comment="kernel-docs less than 2.6.3-3.13.89"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058507" comment="kernel-kdump less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058501" comment="kernel-pae-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058515" comment="kernel-pae-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058502" comment="kernel-pae less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058508" comment="kernel-ppc64-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058520" comment="kernel-ppc64-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058509" comment="kernel-ppc64 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058521" comment="kernel-ps3 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058494" comment="kernel-source less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058495" comment="kernel-syms less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058522" comment="kernel-trace-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058523" comment="kernel-trace-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058524" comment="kernel-trace less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058525" comment="kernel-vanilla less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058497" comment="kernel-xen-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058513" comment="kernel-xen-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058498" comment="kernel-xen less than 2.6.27.45-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0420</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0420" source="CVE"/>
	<description>
	libpurple in Finch in Pidgin before 2.6.6, when an XMPP multi-user chat (MUC) room is used, does not properly parse nicknames containing &lt;br&gt; sequences, which allows remote attackers to cause a denial of service (application crash) via a crafted nickname.
	</description>
 </metadata>
<!-- a886bdab004076b032a70da00a4ae29b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058562" comment="finch-devel less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058563" comment="finch less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058564" comment="libpurple-devel less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058565" comment="libpurple-lang less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058566" comment="libpurple-meanwhile less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058567" comment="libpurple-mono less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058568" comment="libpurple less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058569" comment="pidgin-devel less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058570" comment="pidgin less than 2.6.6-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0423</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0423" source="CVE"/>
	<description>
	gtkimhtml.c in Pidgin before 2.6.6 allows remote attackers to cause a denial of service (CPU consumption and application hang) by sending many smileys in a (1) IM or (2) chat.
	</description>
 </metadata>
<!-- a886bdab004076b032a70da00a4ae29b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058562" comment="finch-devel less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058563" comment="finch less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058564" comment="libpurple-devel less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058565" comment="libpurple-lang less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058566" comment="libpurple-meanwhile less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058567" comment="libpurple-mono less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058568" comment="libpurple less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058569" comment="pidgin-devel less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058570" comment="pidgin less than 2.6.6-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0424</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0424" source="CVE"/>
	<description>
	The edit_cmd function in crontab.c in (1) cronie before 1.4.4 and (2) Vixie cron (vixie-cron) allows local users to change the modification times of arbitrary files, and consequently cause a denial of service, via a symlink attack on a temporary file in the /tmp directory.
	</description>
 </metadata>
<!-- fff0a1fbb5bd5d1953627ebdeab7fa65 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058940" comment="cron less than 4.1-194.33.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0426</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426" source="CVE"/>
	<description>
	sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.
	</description>
 </metadata>
<!-- c1757606ae86a07a67461e4c313fea11 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058648" comment="sudo less than 1.6.9p17-10.37.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0427</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0427" source="CVE"/>
	<description>
	sudo 1.6.x before 1.6.9p21, when the runas_default option is used, does not properly set group memberships, which allows local users to gain privileges via a sudo command.
	</description>
 </metadata>
<!-- c1757606ae86a07a67461e4c313fea11 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058648" comment="sudo less than 1.6.9p17-10.37.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0434</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434" source="CVE"/>
	<description>
	The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
	</description>
 </metadata>
<!-- f7fcabaa2eeb8dc603b7487bf3bf2e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059956" comment="apache2-devel less than 2.2.10-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059957" comment="apache2-doc less than 2.2.10-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059958" comment="apache2-example-pages less than 2.2.10-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059959" comment="apache2-prefork less than 2.2.10-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059960" comment="apache2-utils less than 2.2.10-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059961" comment="apache2-worker less than 2.2.10-2.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059962" comment="apache2 less than 2.2.10-2.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0436</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0436" source="CVE"/>
	<description>
	Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0a7b7d1ced5d668e0f14d2ba352182d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059725" comment="fileshareset less than 2.0-17.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059726" comment="kdebase3-32bit less than 3.5.10-17.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059727" comment="kdebase3-beagle less than 3.5.10-17.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059728" comment="kdebase3-devel less than 3.5.10-17.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059729" comment="kdebase3-extra less than 3.5.10-17.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059730" comment="kdebase3-kdm less than 3.5.10-17.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059731" comment="kdebase3-nsplugin less than 3.5.10-17.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059732" comment="kdebase3-runtime-32bit less than 3.5.10-17.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059733" comment="kdebase3-runtime less than 3.5.10-17.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059734" comment="kdebase3-samba less than 3.5.10-17.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059735" comment="kdebase3-session less than 3.5.10-17.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059736" comment="kdebase3 less than 3.5.10-17.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059737" comment="misc-console-font less than 3.5.10-17.5.1"/>
		</criteria>
	</criteria>
	<!-- b73457fe524d9f52fde0c72f00106362 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059774" comment="kde4-kdm-branding-upstream less than 4.1.3-10.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059775" comment="kde4-kdm less than 4.1.3-10.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059776" comment="kde4-kgreeter-plugins less than 4.1.3-10.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059777" comment="kde4-kwin less than 4.1.3-10.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059778" comment="kdebase4-workspace-branding-upstream less than 4.1.3-10.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059779" comment="kdebase4-workspace-devel less than 4.1.3-10.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059780" comment="kdebase4-workspace-ksysguardd less than 4.1.3-10.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059781" comment="kdebase4-workspace less than 4.1.3-10.4.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0438</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0438" source="CVE"/>
	<description>
	Multiple SQL injection vulnerabilities in Kernel/System/Ticket.pm in OTRS-Core in Open Ticket Request System (OTRS) 2.1.x before 2.1.9, 2.2.x before 2.2.9, 2.3.x before 2.3.5, and 2.4.x before 2.4.7 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
	</description>
 </metadata>
<!-- c55784a0bd50d969d6cd3ad09187b43b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061291" comment="otrs less than 2.2.6-45.18.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0542</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542" source="CVE"/>
	<description>
	The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file.
	</description>
 </metadata>
<!-- b9517c6deeb9b6fb02cdb512c1c8745c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064805" comment="cups-client less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064806" comment="cups-devel less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064807" comment="cups-libs-32bit less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064808" comment="cups-libs-64bit less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064809" comment="cups-libs less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064810" comment="cups less than 1.3.9-7.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0547</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547" source="CVE"/>
	<description>
	client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
	</description>
 </metadata>
<!-- 22c3b43e5e6a873742b51b8f02c7160e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059146" comment="cifs-mount less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059147" comment="ldapsmb less than 1.34b-6.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059148" comment="libnetapi-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059149" comment="libnetapi0 less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059150" comment="libsmbclient-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059151" comment="libsmbclient0-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059152" comment="libsmbclient0-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059153" comment="libsmbclient0 less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059154" comment="libsmbsharemodes-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059155" comment="libsmbsharemodes0 less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059156" comment="libtalloc-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059157" comment="libtalloc1-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059158" comment="libtalloc1-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059159" comment="libtalloc1 less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059160" comment="libtdb-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059161" comment="libtdb1-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059162" comment="libtdb1-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059163" comment="libtdb1 less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059164" comment="libwbclient-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059165" comment="libwbclient0-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059166" comment="libwbclient0-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059167" comment="libwbclient0 less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059168" comment="samba-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059169" comment="samba-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059170" comment="samba-client-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059171" comment="samba-client-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059172" comment="samba-client less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059173" comment="samba-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059174" comment="samba-krb-printing less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059175" comment="samba-vscan less than 0.3.6b-6.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059176" comment="samba-winbind-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059177" comment="samba-winbind-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059178" comment="samba-winbind less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059179" comment="samba less than 3.2.7-11.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0622</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0622" source="CVE"/>
	<description>
	The wake_futex_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly handle certain unlock operations for a Priority Inheritance (PI) futex, which allows local users to cause a denial of service (OOPS) and possibly have unspecified other impact via vectors involving modification of the futex value from user space.
	</description>
 </metadata>
<!-- c86a1b7090754b33393ccb19a5f82147 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058516" comment="kernel-debug-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058517" comment="kernel-debug-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058518" comment="kernel-debug less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058492" comment="kernel-default-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058512" comment="kernel-default-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058493" comment="kernel-default less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058519" comment="kernel-docs less than 2.6.3-3.13.89"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058507" comment="kernel-kdump less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058501" comment="kernel-pae-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058515" comment="kernel-pae-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058502" comment="kernel-pae less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058508" comment="kernel-ppc64-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058520" comment="kernel-ppc64-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058509" comment="kernel-ppc64 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058521" comment="kernel-ps3 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058494" comment="kernel-source less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058495" comment="kernel-syms less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058522" comment="kernel-trace-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058523" comment="kernel-trace-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058524" comment="kernel-trace less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058525" comment="kernel-vanilla less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058497" comment="kernel-xen-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058513" comment="kernel-xen-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058498" comment="kernel-xen less than 2.6.27.45-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0624</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624" source="CVE"/>
	<description>
	Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
	</description>
 </metadata>
<!-- 63aee4198c31eb95a13c8b4dce895430 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060039" comment="tar less than 1.20-23.12.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0629</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0629" source="CVE"/>
	<description>
	Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.
	</description>
 </metadata>
<!-- 99c2190371e2d0ca8fbffda76ea89281 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059591" comment="krb5-32bit less than 1.6.3-132.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059592" comment="krb5-64bit less than 1.6.3-132.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059593" comment="krb5-apps-clients less than 1.6.3-132.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059594" comment="krb5-apps-servers less than 1.6.3-132.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059595" comment="krb5-client less than 1.6.3-132.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059596" comment="krb5-devel-32bit less than 1.6.3-132.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059597" comment="krb5-devel-64bit less than 1.6.3-132.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059598" comment="krb5-devel less than 1.6.3-132.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059599" comment="krb5-server less than 1.6.3-132.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059600" comment="krb5 less than 1.6.3-132.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0653</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0653" source="CVE"/>
	<description>
	Opera before 10.10 permits cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document.
	</description>
 </metadata>
<!-- 73fe5fc7ef96164ae38c3be292808ef2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061279" comment="opera less than 10.60-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0654</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0654" source="CVE"/>
	<description>
	Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 permit cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document.
	</description>
 </metadata>
<!-- 532559966d41a61d017d7cca5a7a2b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061815" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061816" comment="MozillaFirefox-translations-common less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061817" comment="MozillaFirefox-translations-other less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061809" comment="MozillaFirefox less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0732</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0732" source="CVE"/>
	<description>
	gdk/gdkwindow.c in GTK+ before 2.18.5, as used in gnome-screensaver before 2.28.1, performs implicit paints on windows of type GDK_WINDOW_FOREIGN, which triggers an X error in certain circumstances and consequently allows physically proximate attackers to bypass screen locking and access an unattended workstation by pressing the Enter key many times.
	</description>
 </metadata>
<!-- ba2e18ef377fe14e5fe00c563b069e04 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059246" comment="gnome-screensaver-lang less than 2.24.0-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059247" comment="gnome-screensaver less than 2.24.0-7.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0733</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0733" source="CVE"/>
	<description>
	Integer overflow in src/backend/executor/nodeHash.c in PostgreSQL 8.4.1 and earlier, and 8.5 through 8.5alpha2, allows remote authenticated users to cause a denial of service (daemon crash) via a SELECT statement with many LEFT JOIN clauses, related to certain hashtable size calculations.
	</description>
 </metadata>
<!-- 899579e6feb8563f5e72bf79a2b3768c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061271" comment="postgresql-contrib less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061293" comment="postgresql-devel less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061272" comment="postgresql-docs less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061273" comment="postgresql-libs-32bit less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061315" comment="postgresql-libs-64bit less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061275" comment="postgresql-libs less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061316" comment="postgresql-plperl less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061317" comment="postgresql-plpython less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061318" comment="postgresql-pltcl less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061276" comment="postgresql-server less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061277" comment="postgresql less than 8.3.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0736</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0736" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the view_queryform function in lib/viewvc.py in ViewVC before 1.0.10, and 1.1.x before 1.1.4, allows remote attackers to inject arbitrary web script or HTML via "user-provided input."
	</description>
 </metadata>
<!-- 51edae6ec5879ccc5cfc28307acb489b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059210" comment="viewvc less than 1.0.10-0.1.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0739</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0739" source="CVE"/>
	<description>
	Integer overflow in the predospecial function in dospecial.c in dvips in (1) TeX Live and (2) teTeX might allow user-assisted remote attackers to execute arbitrary code via a crafted DVI file that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 8f419b02777e0b42736482414a54c3e4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060450" comment="texlive-arab less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060451" comment="texlive-bin less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060452" comment="texlive-cjk less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060453" comment="texlive-context less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060454" comment="texlive-devel less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060455" comment="texlive-doc less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060456" comment="texlive-dvilj less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060457" comment="texlive-jadetex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060458" comment="texlive-latex-doc less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060459" comment="texlive-latex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060460" comment="texlive-metapost less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060461" comment="texlive-musictex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060462" comment="texlive-nfs less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060463" comment="texlive-omega less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060464" comment="texlive-ppower4 less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060465" comment="texlive-tex4ht less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060466" comment="texlive-tools less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060467" comment="texlive-xetex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060468" comment="texlive-xmltex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060469" comment="texlive less than 2007-219.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0743</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0743" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) 1.0.3, 0.9.5, and earlier and (2) iSCSI Enterprise Target (aka iscsitarget) 0.4.16 allow remote attackers to cause a denial of service (tgtd daemon crash) or possibly have unspecified other impact via vectors that involve the isns_attr_query and qry_rsp_handle functions, and are related to (a) client appearance and (b) client disappearance messages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4db9a1c6f547129a7ba0b581d6254caa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062614" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.48_0.2-89.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062615" comment="iscsitarget-kmp-default less than 0.4.15_2.6.27.48_0.2-89.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062616" comment="iscsitarget-kmp-pae less than 0.4.15_2.6.27.48_0.2-89.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062617" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.48_0.2-89.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062618" comment="iscsitarget-kmp-xen less than 0.4.15_2.6.27.48_0.2-89.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062619" comment="iscsitarget less than 0.4.15-89.12.1"/>
		</criteria>
	</criteria>
	<!-- 9b74cdb843432feb8f09b3e35de01b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062621" comment="tgt less than 0.9.0-1.19.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0748</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0748" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- acf5e585ed710ea962f4fe78e194f187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059437" comment="transmission-gtk less than 1.34-1.33.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059438" comment="transmission-lang less than 1.34-1.33.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059439" comment="transmission less than 1.34-1.33.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0787</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787" source="CVE"/>
	<description>
	client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
	</description>
 </metadata>
<!-- 7b8947e2bd94417dd3f038ed911cba0b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053220" comment="cifs-mount less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061031" comment="ldapsmb less than 1.34b-6.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053250" comment="libnetapi-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053251" comment="libnetapi0 less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053252" comment="libsmbclient-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053222" comment="libsmbclient0-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061032" comment="libsmbclient0-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053224" comment="libsmbclient0 less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053253" comment="libsmbsharemodes-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053254" comment="libsmbsharemodes0 less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053255" comment="libtalloc-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053225" comment="libtalloc1-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061033" comment="libtalloc1-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053227" comment="libtalloc1 less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053256" comment="libtdb-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053228" comment="libtdb1-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061034" comment="libtdb1-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053230" comment="libtdb1 less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053257" comment="libwbclient-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053231" comment="libwbclient0-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061035" comment="libwbclient0-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053233" comment="libwbclient0 less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053234" comment="samba-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061036" comment="samba-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053235" comment="samba-client-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061037" comment="samba-client-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053237" comment="samba-client less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053258" comment="samba-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053238" comment="samba-krb-printing less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061038" comment="samba-vscan less than 0.3.6b-6.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053239" comment="samba-winbind-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061039" comment="samba-winbind-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053241" comment="samba-winbind less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053243" comment="samba less than 3.2.7-11.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0788</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0788" source="CVE"/>
	<description>
	ncpfs 2.2.6 allows local users to cause a denial of service, obtain sensitive information, or possibly gain privileges via symlink attacks involving the (1) ncpmount and (2) ncpumount programs.
	</description>
 </metadata>
<!-- aaa5fe31a01b4144de5bdb5ff45afa98 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060669" comment="ncpfs-32bit less than 2.2.6-147.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060670" comment="ncpfs-64bit less than 2.2.6-147.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060671" comment="ncpfs-devel less than 2.2.6-147.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060672" comment="ncpfs less than 2.2.6-147.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0789</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0789" source="CVE"/>
	<description>
	fusermount in FUSE before 2.7.5, and 2.8.x before 2.8.2, allows local users to unmount an arbitrary FUSE filesystem share via a symlink attack on a mountpoint.
	</description>
 </metadata>
<!-- 39579e9ce0aa6d6f621ab5cf47e314e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060036" comment="fuse-devel less than 2.7.2-61.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060019" comment="fuse less than 2.7.2-61.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060020" comment="libfuse2 less than 2.7.2-61.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0790</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0790" source="CVE"/>
	<description>
	sutil/ncpumount.c in ncpumount in ncpfs 2.2.6 produces certain detailed error messages about the results of privileged file-access attempts, which allows local users to determine the existence of arbitrary files via the mountpoint name.
	</description>
 </metadata>
<!-- aaa5fe31a01b4144de5bdb5ff45afa98 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060669" comment="ncpfs-32bit less than 2.2.6-147.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060670" comment="ncpfs-64bit less than 2.2.6-147.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060671" comment="ncpfs-devel less than 2.2.6-147.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060672" comment="ncpfs less than 2.2.6-147.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0791</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0791" source="CVE"/>
	<description>
	The (1) ncpmount, (2) ncpumount, and (3) ncplogin programs in ncpfs 2.2.6 do not properly create lock files, which allows local users to cause a denial of service (application failure) via unspecified vectors that trigger the creation of a /etc/mtab~ file that persists after the program exits.
	</description>
 </metadata>
<!-- aaa5fe31a01b4144de5bdb5ff45afa98 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060669" comment="ncpfs-32bit less than 2.2.6-147.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060670" comment="ncpfs-64bit less than 2.2.6-147.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060671" comment="ncpfs-devel less than 2.2.6-147.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060672" comment="ncpfs less than 2.2.6-147.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0827</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0827" source="CVE"/>
	<description>
	Integer overflow in dvips in TeX Live 2009 and earlier, and teTeX, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted virtual font (VF) file associated with a DVI file.
	</description>
 </metadata>
<!-- 8f419b02777e0b42736482414a54c3e4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060450" comment="texlive-arab less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060451" comment="texlive-bin less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060452" comment="texlive-cjk less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060453" comment="texlive-context less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060454" comment="texlive-devel less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060455" comment="texlive-doc less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060456" comment="texlive-dvilj less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060457" comment="texlive-jadetex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060458" comment="texlive-latex-doc less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060459" comment="texlive-latex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060460" comment="texlive-metapost less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060461" comment="texlive-musictex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060462" comment="texlive-nfs less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060463" comment="texlive-omega less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060464" comment="texlive-ppower4 less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060465" comment="texlive-tex4ht less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060466" comment="texlive-tools less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060467" comment="texlive-xetex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060468" comment="texlive-xmltex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060469" comment="texlive less than 2007-219.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0829</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0829" source="CVE"/>
	<description>
	Multiple array index errors in set.c in dvipng 1.11 and 1.12, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed DVI file.
	</description>
 </metadata>
<!-- 8f419b02777e0b42736482414a54c3e4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060450" comment="texlive-arab less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060451" comment="texlive-bin less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060452" comment="texlive-cjk less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060453" comment="texlive-context less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060454" comment="texlive-devel less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060455" comment="texlive-doc less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060456" comment="texlive-dvilj less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060457" comment="texlive-jadetex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060458" comment="texlive-latex-doc less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060459" comment="texlive-latex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060460" comment="texlive-metapost less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060461" comment="texlive-musictex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060462" comment="texlive-nfs less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060463" comment="texlive-omega less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060464" comment="texlive-ppower4 less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060465" comment="texlive-tex4ht less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060466" comment="texlive-tools less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060467" comment="texlive-xetex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060468" comment="texlive-xmltex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060469" comment="texlive less than 2007-219.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0830</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830" source="CVE"/>
	<description>
	Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.
	</description>
 </metadata>
<!-- 7f2cb38ab30086b2e83a460f9fab3881 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063995" comment="glibc-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063996" comment="glibc-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063997" comment="glibc-devel-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063998" comment="glibc-devel-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063999" comment="glibc-devel less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064000" comment="glibc-html less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064001" comment="glibc-i18ndata less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064002" comment="glibc-info less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064003" comment="glibc-locale-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064004" comment="glibc-locale-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064005" comment="glibc-locale less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064006" comment="glibc-obsolete less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064007" comment="glibc-profile-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064008" comment="glibc-profile-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064009" comment="glibc-profile less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064010" comment="glibc less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064011" comment="nscd less than 2.9-2.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0837</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0837" source="CVE"/>
	<description>
	Unspecified vulnerability in the Pack200 component in Oracle Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0838</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0838" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow using an untrusted size value in the readMabCurveData function in the CMM module in the JVM.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0839</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0839" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0840</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0841</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0841" source="CVE"/>
	<description>
	Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the Java Runtime Environment that allows remote attackers to execute arbitrary code via a JPEG image that contains subsample dimensions with large values, related to JPEGImageReader and "stepX".
	</description>
 </metadata>
<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0842</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0842" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an uncontrolled array index that allows remote attackers to execute arbitrary code via a MIDI file with a crafted MixerSequencer object, related to the GM_Song structure.
	</description>
 </metadata>
<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0843</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0843" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is related to XNewPtr and improper handling of an integer parameter when allocating heap memory in the com.sun.media.sound libraries, which allows remote attackers to execute arbitrary code.
	</description>
 </metadata>
<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0844</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0844" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is for improper parsing of a crafted MIDI stream when creating a MixerSequencer object, which causes a pointer to be corrupted and allows a NULL byte to be written to arbitrary memory.
	</description>
 </metadata>
<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0845</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0845" source="CVE"/>
	<description>
	Unspecified vulnerability in the HotSpot Server component in Oracle Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0846</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0846" source="CVE"/>
	<description>
	Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows remote attackers to execute arbitrary code, related to an "invalid assignment" and inconsistent length values in a JPEG image encoder (JPEGImageEncoderImpl).
	</description>
 </metadata>
<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0847</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0847" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows arbitrary code execution via a crafted image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0848</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0848" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e44020beba82366d00f30078455bb06 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060008" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060009" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060010" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060011" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060012" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b17-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060013" comment="java-1_6_0-openjdk less than 1.6.0.0_b17-2.3.1"/>
		</criteria>
	</criteria>
	<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0849</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0849" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow in a decoding routine used by the JPEGImageDecoderImpl interface, which allows code execution via a crafted JPEG image.
	</description>
 </metadata>
<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0850</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0850" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- a45b56e9c38a3a86f3f974daddf9d90d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059302" comment="java-1_6_0-sun-alsa less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059304" comment="java-1_6_0-sun-devel less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059305" comment="java-1_6_0-sun-jdbc less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059306" comment="java-1_6_0-sun-plugin less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059307" comment="java-1_6_0-sun-src less than 1.6.0.u19-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059308" comment="java-1_6_0-sun less than 1.6.0.u19-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0887</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0887" source="CVE"/>
	<description>
	Unspecified vulnerability in the New Java Plug-in component in Oracle Java SE and Java for Business JDK and JRE 6 Update 18 and 19 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- aba1c4f6a52f47d353e3fa5bad5c5063 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059808" comment="java-1_6_0-sun-alsa less than 1.6.0.u20-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059810" comment="java-1_6_0-sun-devel less than 1.6.0.u20-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059811" comment="java-1_6_0-sun-jdbc less than 1.6.0.u20-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059812" comment="java-1_6_0-sun-plugin less than 1.6.0.u20-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059813" comment="java-1_6_0-sun-src less than 1.6.0.u20-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059814" comment="java-1_6_0-sun less than 1.6.0.u20-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0926</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-0926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926" source="CVE"/>
	<description>
	The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.
	</description>
 </metadata>
<!-- 22c3b43e5e6a873742b51b8f02c7160e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059146" comment="cifs-mount less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059147" comment="ldapsmb less than 1.34b-6.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059148" comment="libnetapi-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059149" comment="libnetapi0 less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059150" comment="libsmbclient-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059151" comment="libsmbclient0-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059152" comment="libsmbclient0-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059153" comment="libsmbclient0 less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059154" comment="libsmbsharemodes-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059155" comment="libsmbsharemodes0 less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059156" comment="libtalloc-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059157" comment="libtalloc1-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059158" comment="libtalloc1-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059159" comment="libtalloc1 less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059160" comment="libtdb-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059161" comment="libtdb1-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059162" comment="libtdb1-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059163" comment="libtdb1 less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059164" comment="libwbclient-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059165" comment="libwbclient0-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059166" comment="libwbclient0-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059167" comment="libwbclient0 less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059168" comment="samba-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059169" comment="samba-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059170" comment="samba-client-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059171" comment="samba-client-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059172" comment="samba-client less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059173" comment="samba-devel less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059174" comment="samba-krb-printing less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059175" comment="samba-vscan less than 0.3.6b-6.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059176" comment="samba-winbind-32bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059177" comment="samba-winbind-64bit less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059178" comment="samba-winbind less than 3.2.7-11.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059179" comment="samba less than 3.2.7-11.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1000</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1000" source="CVE"/>
	<description>
	Directory traversal vulnerability in KGet in KDE SC 4.0.0 through 4.4.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b7ffa4b088034686f08e44d578e30993 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065276" comment="kdenetwork3-IRC less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065277" comment="kdenetwork3-InstantMessenger less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065278" comment="kdenetwork3-devel less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065279" comment="kdenetwork3-dialup less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065280" comment="kdenetwork3-lan less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065281" comment="kdenetwork3-lisa less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065282" comment="kdenetwork3-news less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065283" comment="kdenetwork3-query less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065284" comment="kdenetwork3-vnc less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065285" comment="kdenetwork3-wireless less than 3.5.10-12.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065286" comment="kdenetwork3 less than 3.5.10-12.11.1"/>
		</criteria>
	</criteria>
	<!-- bf1ca3be2e3996a378ffaf6247d0eb15 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065214" comment="kde4-kdnssd less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065215" comment="kde4-kget less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065216" comment="kde4-knewsticker less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065217" comment="kde4-kopete-devel less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065218" comment="kde4-kopete less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065219" comment="kde4-kppp less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065220" comment="kde4-krdc less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065221" comment="kde4-krfb less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065222" comment="kdenetwork4-filesharing less than 4.1.3-4.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065223" comment="kdenetwork4 less than 4.1.3-4.15.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1085</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1085" source="CVE"/>
	<description>
	The azx_position_ok function in hda_intel.c in Linux kernel 2.6.33-rc4 and earlier, when running on the AMD780V chip set, allows context-dependent attackers to cause a denial of service (crash) via unknown manipulations that trigger a divide-by-zero error.
	</description>
 </metadata>
<!-- c86a1b7090754b33393ccb19a5f82147 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058516" comment="kernel-debug-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058517" comment="kernel-debug-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058518" comment="kernel-debug less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058492" comment="kernel-default-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058512" comment="kernel-default-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058493" comment="kernel-default less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058519" comment="kernel-docs less than 2.6.3-3.13.89"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058507" comment="kernel-kdump less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058501" comment="kernel-pae-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058515" comment="kernel-pae-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058502" comment="kernel-pae less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058508" comment="kernel-ppc64-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058520" comment="kernel-ppc64-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058509" comment="kernel-ppc64 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058521" comment="kernel-ps3 less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058494" comment="kernel-source less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058495" comment="kernel-syms less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058522" comment="kernel-trace-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058523" comment="kernel-trace-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058524" comment="kernel-trace less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058525" comment="kernel-vanilla less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058497" comment="kernel-xen-base less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058513" comment="kernel-xen-extra less than 2.6.27.45-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058498" comment="kernel-xen less than 2.6.27.45-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1087</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1087" source="CVE"/>
	<description>
	The nfs_wait_on_request function in fs/nfs/pagelist.c in Linux kernel 2.6.x through 2.6.33-rc5 allows attackers to cause a denial of service (Oops) via unknown vectors related to truncating a file and an operation that is not interruptible.
	</description>
 </metadata>
<!-- 574a4c9c3e74805d1c0c29cf29aa4953 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061671" comment="kernel-debug-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061672" comment="kernel-debug-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061673" comment="kernel-debug less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061674" comment="kernel-default-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061675" comment="kernel-default-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061676" comment="kernel-default less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061677" comment="kernel-docs less than 2.6.3-3.13.109"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061678" comment="kernel-kdump less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061679" comment="kernel-pae-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061680" comment="kernel-pae-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061681" comment="kernel-pae less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061682" comment="kernel-ppc64-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061683" comment="kernel-ppc64-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061684" comment="kernel-ppc64 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061685" comment="kernel-ps3 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061686" comment="kernel-source less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061687" comment="kernel-syms less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061688" comment="kernel-trace-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061689" comment="kernel-trace-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061690" comment="kernel-trace less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061691" comment="kernel-vanilla less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061692" comment="kernel-xen-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061693" comment="kernel-xen-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061694" comment="kernel-xen less than 2.6.27.48-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1121</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1121" source="CVE"/>
	<description>
	Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010.
	</description>
 </metadata>
<!-- 53b9f1d7a183738f7384e1ca35aa996b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061221" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061222" comment="MozillaFirefox-translations-common less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061223" comment="MozillaFirefox-translations-other less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061224" comment="MozillaFirefox less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061225" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061226" comment="mozilla-xulrunner191-devel less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061227" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061228" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061229" comment="mozilla-xulrunner191-translations-common less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061230" comment="mozilla-xulrunner191-translations-other less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061231" comment="mozilla-xulrunner191 less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061232" comment="python-xpcom191 less than 1.9.1.10-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1125</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1125" source="CVE"/>
	<description>
	The JavaScript implementation in Mozilla Firefox 3.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via certain calls to the focus method.
	</description>
 </metadata>
<!-- 53b9f1d7a183738f7384e1ca35aa996b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061221" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061222" comment="MozillaFirefox-translations-common less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061223" comment="MozillaFirefox-translations-other less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061224" comment="MozillaFirefox less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061225" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061226" comment="mozilla-xulrunner191-devel less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061227" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061228" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061229" comment="mozilla-xulrunner191-translations-common less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061230" comment="mozilla-xulrunner191-translations-other less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061231" comment="mozilla-xulrunner191 less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061232" comment="python-xpcom191 less than 1.9.1.10-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1152</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1152" source="CVE"/>
	<description>
	memcached.c in memcached before 1.4.3 allows remote attackers to cause a denial of service (daemon hang or crash) via a long line that triggers excessive memory allocation.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- e85c5420764bcb2c42ea615048a057f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060799" comment="memcached less than 1.2.6-5.8.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1155</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1155" source="CVE"/>
	<description>
	Irssi before 0.8.15, when SSL is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) field or a Subject Alternative Name field of the X.509 certificate, which allows man-in-the-middle attackers to spoof IRC servers via an arbitrary certificate.
	</description>
 </metadata>
<!-- 510977c184838b0b4605f7172fb7276f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060016" comment="irssi-devel less than 0.8.12-30.71.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060017" comment="irssi less than 0.8.12-30.71.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1156</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1156" source="CVE"/>
	<description>
	core/nicklist.c in Irssi before 0.8.15 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an attempted fuzzy nick match at the instant that a victim leaves a channel.
	</description>
 </metadata>
<!-- 510977c184838b0b4605f7172fb7276f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060016" comment="irssi-devel less than 0.8.12-30.71.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060017" comment="irssi less than 0.8.12-30.71.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1157</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1157" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.
	</description>
 </metadata>
<!-- bb5b71fd7148a30e8daa6e27f0034bd5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062701" comment="tomcat6-admin-webapps less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062702" comment="tomcat6-docs-webapp less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062703" comment="tomcat6-javadoc less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062704" comment="tomcat6-jsp-2_1-api less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062705" comment="tomcat6-lib less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062706" comment="tomcat6-servlet-2_5-api less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062707" comment="tomcat6-webapps less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062708" comment="tomcat6 less than 6.0.18-16.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1162</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1162" source="CVE"/>
	<description>
	The release_one_tty function in drivers/char/tty_io.c in the Linux kernel before 2.6.34-rc4 omits certain required calls to the put_pid function, which has unspecified impact and local attack vectors.
	</description>
 </metadata>
<!-- 574a4c9c3e74805d1c0c29cf29aa4953 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061671" comment="kernel-debug-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061672" comment="kernel-debug-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061673" comment="kernel-debug less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061674" comment="kernel-default-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061675" comment="kernel-default-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061676" comment="kernel-default less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061677" comment="kernel-docs less than 2.6.3-3.13.109"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061678" comment="kernel-kdump less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061679" comment="kernel-pae-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061680" comment="kernel-pae-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061681" comment="kernel-pae less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061682" comment="kernel-ppc64-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061683" comment="kernel-ppc64-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061684" comment="kernel-ppc64 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061685" comment="kernel-ps3 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061686" comment="kernel-source less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061687" comment="kernel-syms less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061688" comment="kernel-trace-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061689" comment="kernel-trace-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061690" comment="kernel-trace less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061691" comment="kernel-vanilla less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061692" comment="kernel-xen-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061693" comment="kernel-xen-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061694" comment="kernel-xen less than 2.6.27.48-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1168</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1168" source="CVE"/>
	<description>
	The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."
	</description>
 </metadata>
<!-- 859fb17c5c6f9b66a2a1d511ab1489c9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062019" comment="perl-32bit less than 5.10.0-62.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062020" comment="perl-64bit less than 5.10.0-62.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062021" comment="perl-base-32bit less than 5.10.0-62.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062022" comment="perl-base-64bit less than 5.10.0-62.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062023" comment="perl-base less than 5.10.0-62.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062024" comment="perl-doc less than 5.10.0-62.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062025" comment="perl less than 5.10.0-62.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1169</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1169" source="CVE"/>
	<description>
	PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 does not properly restrict PL/perl procedures, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Perl code via a crafted script, related to the Safe module (aka Safe.pm) for Perl. NOTE: some sources report that this issue is the same as CVE-2010-1447.
	</description>
 </metadata>
<!-- 899579e6feb8563f5e72bf79a2b3768c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061271" comment="postgresql-contrib less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061293" comment="postgresql-devel less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061272" comment="postgresql-docs less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061273" comment="postgresql-libs-32bit less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061315" comment="postgresql-libs-64bit less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061275" comment="postgresql-libs less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061316" comment="postgresql-plperl less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061317" comment="postgresql-plpython less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061318" comment="postgresql-pltcl less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061276" comment="postgresql-server less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061277" comment="postgresql less than 8.3.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1170</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1170" source="CVE"/>
	<description>
	The PL/Tcl implementation in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 loads Tcl code from the pltcl_modules table regardless of the table's ownership and permissions, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Tcl code by creating this table and inserting a crafted Tcl script.
	</description>
 </metadata>
<!-- 899579e6feb8563f5e72bf79a2b3768c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061271" comment="postgresql-contrib less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061293" comment="postgresql-devel less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061272" comment="postgresql-docs less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061273" comment="postgresql-libs-32bit less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061315" comment="postgresql-libs-64bit less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061275" comment="postgresql-libs less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061316" comment="postgresql-plperl less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061317" comment="postgresql-plpython less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061318" comment="postgresql-pltcl less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061276" comment="postgresql-server less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061277" comment="postgresql less than 8.3.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1172</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1172" source="CVE"/>
	<description>
	DBus-GLib 0.73 disregards the access flag of exported GObject properties, which allows local users to bypass intended access restrictions and possibly cause a denial of service by modifying properties, as demonstrated by properties of the (1) DeviceKit-Power, (2) NetworkManager, and (3) ModemManager services.
	</description>
 </metadata>
<!-- d88357f18779fcbfd8392ad9407455d2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064456" comment="gdm-branding-upstream less than 2.24.0-15.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064457" comment="gdm-lang less than 2.24.0-15.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064458" comment="gdm less than 2.24.0-15.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1192</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1192" source="CVE"/>
	<description>
	libESMTP, probably 1.0.4 and earlier, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- fe4b91d9447161cc3bb5d59ab676a039 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060314" comment="libesmtp-devel less than 1.0.4-157.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060315" comment="libesmtp less than 1.0.4-157.35.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1194</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1194" source="CVE"/>
	<description>
	The match_component function in smtp-tls.c in libESMTP 1.0.3.r1, and possibly other versions including 1.0.4, treats two strings as equal if one is a substring of the other, which allows remote attackers to spoof trusted certificates via a crafted subjectAltName.
	</description>
 </metadata>
<!-- fe4b91d9447161cc3bb5d59ab676a039 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060314" comment="libesmtp-devel less than 1.0.4-157.35.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060315" comment="libesmtp less than 1.0.4-157.35.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1196</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1196" source="CVE"/>
	<description>
	Integer overflow in the nsGenericDOMDataNode::SetTextInternal function in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a DOM node with a long text value that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 53b9f1d7a183738f7384e1ca35aa996b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061221" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061222" comment="MozillaFirefox-translations-common less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061223" comment="MozillaFirefox-translations-other less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061224" comment="MozillaFirefox less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061225" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061226" comment="mozilla-xulrunner191-devel less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061227" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061228" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061229" comment="mozilla-xulrunner191-translations-common less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061230" comment="mozilla-xulrunner191-translations-other less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061231" comment="mozilla-xulrunner191 less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061232" comment="python-xpcom191 less than 1.9.1.10-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1197</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1197" source="CVE"/>
	<description>
	Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, does not properly handle situations in which both "Content-Disposition: attachment" and "Content-Type: multipart" are present in HTTP headers, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an uploaded HTML document.
	</description>
 </metadata>
<!-- 53b9f1d7a183738f7384e1ca35aa996b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061221" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061222" comment="MozillaFirefox-translations-common less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061223" comment="MozillaFirefox-translations-other less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061224" comment="MozillaFirefox less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061225" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061226" comment="mozilla-xulrunner191-devel less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061227" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061228" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061229" comment="mozilla-xulrunner191-translations-common less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061230" comment="mozilla-xulrunner191-translations-other less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061231" comment="mozilla-xulrunner191 less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061232" comment="python-xpcom191 less than 1.9.1.10-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1198</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1198" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.
	</description>
 </metadata>
<!-- 53b9f1d7a183738f7384e1ca35aa996b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061221" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061222" comment="MozillaFirefox-translations-common less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061223" comment="MozillaFirefox-translations-other less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061224" comment="MozillaFirefox less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061225" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061226" comment="mozilla-xulrunner191-devel less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061227" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061228" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061229" comment="mozilla-xulrunner191-translations-common less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061230" comment="mozilla-xulrunner191-translations-other less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061231" comment="mozilla-xulrunner191 less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061232" comment="python-xpcom191 less than 1.9.1.10-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1199</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1199" source="CVE"/>
	<description>
	Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node.
	</description>
 </metadata>
<!-- 53b9f1d7a183738f7384e1ca35aa996b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061221" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061222" comment="MozillaFirefox-translations-common less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061223" comment="MozillaFirefox-translations-other less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061224" comment="MozillaFirefox less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061225" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061226" comment="mozilla-xulrunner191-devel less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061227" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061228" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061229" comment="mozilla-xulrunner191-translations-common less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061230" comment="mozilla-xulrunner191-translations-other less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061231" comment="mozilla-xulrunner191 less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061232" comment="python-xpcom191 less than 1.9.1.10-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1200</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1200" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 53b9f1d7a183738f7384e1ca35aa996b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061221" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061222" comment="MozillaFirefox-translations-common less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061223" comment="MozillaFirefox-translations-other less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061224" comment="MozillaFirefox less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061225" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061226" comment="mozilla-xulrunner191-devel less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061227" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061228" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061229" comment="mozilla-xulrunner191-translations-common less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061230" comment="mozilla-xulrunner191-translations-other less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061231" comment="mozilla-xulrunner191 less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061232" comment="python-xpcom191 less than 1.9.1.10-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1201</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1201" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.10, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 53b9f1d7a183738f7384e1ca35aa996b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061221" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061222" comment="MozillaFirefox-translations-common less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061223" comment="MozillaFirefox-translations-other less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061224" comment="MozillaFirefox less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061225" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061226" comment="mozilla-xulrunner191-devel less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061227" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061228" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061229" comment="mozilla-xulrunner191-translations-common less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061230" comment="mozilla-xulrunner191-translations-other less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061231" comment="mozilla-xulrunner191 less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061232" comment="python-xpcom191 less than 1.9.1.10-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1202</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1202" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 53b9f1d7a183738f7384e1ca35aa996b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061221" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061222" comment="MozillaFirefox-translations-common less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061223" comment="MozillaFirefox-translations-other less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061224" comment="MozillaFirefox less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061225" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061226" comment="mozilla-xulrunner191-devel less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061227" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061228" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061229" comment="mozilla-xulrunner191-translations-common less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061230" comment="mozilla-xulrunner191-translations-other less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061231" comment="mozilla-xulrunner191 less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061232" comment="python-xpcom191 less than 1.9.1.10-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1203</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1203" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox 3.6.x before 3.6.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger an assertion failure in jstracer.cpp.
	</description>
 </metadata>
<!-- 53b9f1d7a183738f7384e1ca35aa996b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061221" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061222" comment="MozillaFirefox-translations-common less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061223" comment="MozillaFirefox-translations-other less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061224" comment="MozillaFirefox less than 3.5.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061225" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061226" comment="mozilla-xulrunner191-devel less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061227" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061228" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061229" comment="mozilla-xulrunner191-translations-common less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061230" comment="mozilla-xulrunner191-translations-other less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061231" comment="mozilla-xulrunner191 less than 1.9.1.10-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061232" comment="python-xpcom191 less than 1.9.1.10-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1205</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205" source="CVE"/>
	<description>
	Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 45015c1d031bee51190b56cabba5905c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062307" comment="libpng-devel-32bit less than 1.2.31-4.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062308" comment="libpng-devel-64bit less than 1.2.31-4.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062309" comment="libpng-devel less than 1.2.31-4.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062310" comment="libpng12-0-32bit less than 1.2.31-4.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062311" comment="libpng12-0-64bit less than 1.2.31-4.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062312" comment="libpng12-0 less than 1.2.31-4.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062313" comment="libpng3 less than 1.2.31-4.40.1"/>
		</criteria>
	</criteria>
	<!-- 532559966d41a61d017d7cca5a7a2b3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061815" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061816" comment="MozillaFirefox-translations-common less than 3.5.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061817" comment="MozillaFirefox-translations-other less than 3.5.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061809" comment="MozillaFirefox less than 3.5.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1206</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1206" source="CVE"/>
	<description>
	The startDocumentLoad function in browser/base/content/browser.js in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, does not properly implement the Same Origin Policy in certain circumstances related to the about:blank document and a document that is currently loading, which allows (1) remote web servers to conduct spoofing attacks via vectors involving a 204 (aka No Content) status code, and allows (2) remote attackers to conduct spoofing attacks via vectors involving a window.stop call.
	</description>
 </metadata>
<!-- 532559966d41a61d017d7cca5a7a2b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061815" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061816" comment="MozillaFirefox-translations-common less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061817" comment="MozillaFirefox-translations-other less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061809" comment="MozillaFirefox less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1208</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1208" source="CVE"/>
	<description>
	Use-after-free vulnerability in the attribute-cloning functionality in the DOM implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via vectors related to deletion of an event attribute node with a nonzero reference count.
	</description>
 </metadata>
<!-- 532559966d41a61d017d7cca5a7a2b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061815" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061816" comment="MozillaFirefox-translations-common less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061817" comment="MozillaFirefox-translations-other less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061809" comment="MozillaFirefox less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1209</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1209" source="CVE"/>
	<description>
	Use-after-free vulnerability in the NodeIterator implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via a crafted NodeFilter that detaches DOM nodes, related to the NodeIterator interface and a javascript callback.
	</description>
 </metadata>
<!-- 532559966d41a61d017d7cca5a7a2b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061815" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061816" comment="MozillaFirefox-translations-common less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061817" comment="MozillaFirefox-translations-other less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061809" comment="MozillaFirefox less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1211</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1211" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 532559966d41a61d017d7cca5a7a2b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061815" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061816" comment="MozillaFirefox-translations-common less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061817" comment="MozillaFirefox-translations-other less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061809" comment="MozillaFirefox less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1213</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1213" source="CVE"/>
	<description>
	The importScripts Web Worker method in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not verify that content is valid JavaScript code, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted HTML document.
	</description>
 </metadata>
<!-- 532559966d41a61d017d7cca5a7a2b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061815" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061816" comment="MozillaFirefox-translations-common less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061817" comment="MozillaFirefox-translations-other less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061809" comment="MozillaFirefox less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1214</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1214" source="CVE"/>
	<description>
	Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
	</description>
 </metadata>
<!-- 532559966d41a61d017d7cca5a7a2b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061815" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061816" comment="MozillaFirefox-translations-common less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061817" comment="MozillaFirefox-translations-other less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061809" comment="MozillaFirefox less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1240</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1240" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, do not restrict the contents of one text field in the Launch File warning dialog, which makes it easier for remote attackers to trick users into executing an arbitrary local program that was specified in a PDF document, as demonstrated by a text field that claims that the Open button will enable the user to read an encrypted message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
		</criteria>
	</criteria>
	<!-- cf42df06792fbc140654995f11bbcd1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062172" comment="acroread-cmaps less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062173" comment="acroread-fonts-ja less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062174" comment="acroread-fonts-ko less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062175" comment="acroread-fonts-zh_CN less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062176" comment="acroread-fonts-zh_TW less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062177" comment="acroread less than 9.3.4-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1241</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1241" source="CVE"/>
	<description>
	Heap-based buffer overflow in the custom heap management system in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, aka FG-VD-10-005.
	</description>
 </metadata>
<!-- a6d44afaaae2fed54820d3fb574ca5e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059796" comment="acroread-cmaps less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059797" comment="acroread-fonts-ja less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059798" comment="acroread-fonts-ko less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059799" comment="acroread-fonts-zh_CN less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059800" comment="acroread-fonts-zh_TW less than 9.3.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1285</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1295</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1295" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1297</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
	</criteria>
	<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1321</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321" source="CVE"/>
	<description>
	The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
	<!-- adae160af2d9075985d4ff08071cf2f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060785" comment="krb5-32bit less than 1.6.3-132.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060786" comment="krb5-64bit less than 1.6.3-132.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060787" comment="krb5-apps-clients less than 1.6.3-132.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060788" comment="krb5-apps-servers less than 1.6.3-132.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060789" comment="krb5-client less than 1.6.3-132.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060790" comment="krb5-devel-32bit less than 1.6.3-132.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060791" comment="krb5-devel-64bit less than 1.6.3-132.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060792" comment="krb5-devel less than 1.6.3-132.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060793" comment="krb5-plugin-kdb-ldap less than 1.6.3-132.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060794" comment="krb5-plugin-preauth-pkinit less than 1.6.3-132.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060795" comment="krb5-server less than 1.6.3-132.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060796" comment="krb5 less than 1.6.3-132.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1323</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
	</description>
 </metadata>
<!-- c8c28ea32e843131e4622c708eb77d1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065125" comment="krb5-32bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065126" comment="krb5-64bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065127" comment="krb5-apps-clients less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065128" comment="krb5-apps-servers less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065129" comment="krb5-client less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065130" comment="krb5-devel-32bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065131" comment="krb5-devel-64bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065132" comment="krb5-devel less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065133" comment="krb5-plugin-kdb-ldap less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065134" comment="krb5-plugin-preauth-pkinit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065135" comment="krb5-server less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065136" comment="krb5 less than 1.6.3-132.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1324</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.
	</description>
 </metadata>
<!-- c8c28ea32e843131e4622c708eb77d1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065125" comment="krb5-32bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065126" comment="krb5-64bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065127" comment="krb5-apps-clients less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065128" comment="krb5-apps-servers less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065129" comment="krb5-client less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065130" comment="krb5-devel-32bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065131" comment="krb5-devel-64bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065132" comment="krb5-devel less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065133" comment="krb5-plugin-kdb-ldap less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065134" comment="krb5-plugin-preauth-pkinit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065135" comment="krb5-server less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065136" comment="krb5 less than 1.6.3-132.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1411</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1411" source="CVE"/>
	<description>
	Multiple integer overflows in the Fax3SetupState function in tif_fax3.c in the FAX3 decoder in LibTIFF before 3.9.3, as used in ImageIO in Apple Mac OS X 10.5.8 and Mac OS X 10.6 before 10.6.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 561e21d7e0d2db315c3ace938cb0f2a9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060867" comment="libtiff-devel-32bit less than 3.8.2-133.39.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060868" comment="libtiff-devel-64bit less than 3.8.2-133.39.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060869" comment="libtiff-devel less than 3.8.2-133.39.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060870" comment="libtiff3-32bit less than 3.8.2-133.39.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060871" comment="libtiff3-64bit less than 3.8.2-133.39.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060872" comment="libtiff3 less than 3.8.2-133.39.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060873" comment="tiff less than 3.8.2-133.39.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1437</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1437" source="CVE"/>
	<description>
	Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.
	</description>
 </metadata>
<!-- 574a4c9c3e74805d1c0c29cf29aa4953 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061671" comment="kernel-debug-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061672" comment="kernel-debug-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061673" comment="kernel-debug less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061674" comment="kernel-default-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061675" comment="kernel-default-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061676" comment="kernel-default less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061677" comment="kernel-docs less than 2.6.3-3.13.109"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061678" comment="kernel-kdump less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061679" comment="kernel-pae-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061680" comment="kernel-pae-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061681" comment="kernel-pae less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061682" comment="kernel-ppc64-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061683" comment="kernel-ppc64-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061684" comment="kernel-ppc64 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061685" comment="kernel-ps3 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061686" comment="kernel-source less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061687" comment="kernel-syms less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061688" comment="kernel-trace-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061689" comment="kernel-trace-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061690" comment="kernel-trace less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061691" comment="kernel-vanilla less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061692" comment="kernel-xen-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061693" comment="kernel-xen-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061694" comment="kernel-xen less than 2.6.27.48-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1440</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1440" source="CVE"/>
	<description>
	Multiple integer overflows in dvipsk/dospecial.c in dvips in TeX Live 2009 and earlier, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a special command in a DVI file, related to the (1) predospecial and (2) bbdospecial functions, a different vulnerability than CVE-2010-0739.
	</description>
 </metadata>
<!-- 8f419b02777e0b42736482414a54c3e4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060450" comment="texlive-arab less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060451" comment="texlive-bin less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060452" comment="texlive-cjk less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060453" comment="texlive-context less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060454" comment="texlive-devel less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060455" comment="texlive-doc less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060456" comment="texlive-dvilj less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060457" comment="texlive-jadetex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060458" comment="texlive-latex-doc less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060459" comment="texlive-latex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060460" comment="texlive-metapost less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060461" comment="texlive-musictex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060462" comment="texlive-nfs less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060463" comment="texlive-omega less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060464" comment="texlive-ppower4 less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060465" comment="texlive-tex4ht less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060466" comment="texlive-tools less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060467" comment="texlive-xetex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060468" comment="texlive-xmltex less than 2007-219.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060469" comment="texlive less than 2007-219.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1446</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1446" source="CVE"/>
	<description>
	arch/powerpc/mm/fsl_booke_mmu.c in KGDB in the Linux kernel 2.6.30 and other versions before 2.6.33, when running on PowerPC, does not properly perform a security check for access to a kernel page, which allows local users to overwrite arbitrary kernel memory, related to Fsl booke.
	</description>
 </metadata>
<!-- 574a4c9c3e74805d1c0c29cf29aa4953 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061671" comment="kernel-debug-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061672" comment="kernel-debug-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061673" comment="kernel-debug less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061674" comment="kernel-default-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061675" comment="kernel-default-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061676" comment="kernel-default less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061677" comment="kernel-docs less than 2.6.3-3.13.109"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061678" comment="kernel-kdump less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061679" comment="kernel-pae-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061680" comment="kernel-pae-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061681" comment="kernel-pae less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061682" comment="kernel-ppc64-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061683" comment="kernel-ppc64-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061684" comment="kernel-ppc64 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061685" comment="kernel-ps3 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061686" comment="kernel-source less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061687" comment="kernel-syms less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061688" comment="kernel-trace-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061689" comment="kernel-trace-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061690" comment="kernel-trace less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061691" comment="kernel-vanilla less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061692" comment="kernel-xen-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061693" comment="kernel-xen-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061694" comment="kernel-xen less than 2.6.27.48-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1447</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1447" source="CVE"/>
	<description>
	The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
	</description>
 </metadata>
<!-- 859fb17c5c6f9b66a2a1d511ab1489c9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062019" comment="perl-32bit less than 5.10.0-62.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062020" comment="perl-64bit less than 5.10.0-62.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062021" comment="perl-base-32bit less than 5.10.0-62.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062022" comment="perl-base-64bit less than 5.10.0-62.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062023" comment="perl-base less than 5.10.0-62.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062024" comment="perl-doc less than 5.10.0-62.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062025" comment="perl less than 5.10.0-62.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1455</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1455" source="CVE"/>
	<description>
	The DOCSIS dissector in Wireshark 0.9.6 through 1.0.12 and 1.2.0 through 1.2.7 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed packet trace file.
	</description>
 </metadata>
<!-- c6154f4e14e9cb7679828da0ff02362d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065421" comment="wireshark-devel less than 1.4.2-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065422" comment="wireshark less than 1.4.2-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1459</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1459" source="CVE"/>
	<description>
	The default configuration of ASP.NET in Mono before 2.6.4 has a value of FALSE for the EnableViewStateMac property, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by the __VIEWSTATE parameter to 2.0/menu/menu1.aspx in the XSP sample project.
	</description>
 </metadata>
<!-- 0b70a32cb2a5171eb2b7da8e0d25e4e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061059" comment="bytefx-data-mysql less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061060" comment="ibm-data-db2 less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061061" comment="mono-complete less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061062" comment="mono-core-32bit less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061063" comment="mono-core less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061064" comment="mono-data-firebird less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061065" comment="mono-data-oracle less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061066" comment="mono-data-postgresql less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061067" comment="mono-data-sqlite less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061068" comment="mono-data-sybase less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061069" comment="mono-data less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061070" comment="mono-devel less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061071" comment="mono-extras less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061072" comment="mono-jscript less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061073" comment="mono-locale-extras less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061074" comment="mono-nunit less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061075" comment="mono-web less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061076" comment="mono-winforms less than 2.0.1-1.23.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061077" comment="monodoc-core less than 2.0-1.42.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1512</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1512" source="CVE"/>
	<description>
	Directory traversal vulnerability in aria2 before 1.9.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.
	</description>
 </metadata>
<!-- 414c951d111fc834fb6751bceb478e99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062622" comment="aria2 less than 0.16.0-1.20.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1526</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1526" source="CVE"/>
	<description>
	Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow attackers to execute arbitrary code via (1) a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; (2) a crafted JPEG file, related to the gdip_load_jpeg_image_internal function in jpegcodec.c; or (3) a crafted BMP file, related to the gdip_read_bmp_image function in bmpcodec.c, leading to heap-based buffer overflows.
	</description>
 </metadata>
<!-- 6c3051a4927013b3038e41497d05506d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063151" comment="libgdiplus0 less than 2.0-11.33.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1613</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1613" source="CVE"/>
	<description>
	Moodle 1.8.x and 1.9.x before 1.9.8 does not enable the "Regenerate session id during login" setting by default, which makes it easier for remote attackers to conduct session fixation attacks.
	</description>
 </metadata>
<!-- 0c81eff79776eef909a6ba171e417267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060210" comment="moodle-af less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060211" comment="moodle-ar less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060212" comment="moodle-be less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060213" comment="moodle-bg less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060214" comment="moodle-bs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060215" comment="moodle-ca less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060216" comment="moodle-cs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060217" comment="moodle-da less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060218" comment="moodle-de less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060219" comment="moodle-de_du less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060220" comment="moodle-el less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060221" comment="moodle-es less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060222" comment="moodle-et less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060223" comment="moodle-eu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060224" comment="moodle-fa less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060225" comment="moodle-fi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060226" comment="moodle-fr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060227" comment="moodle-ga less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060228" comment="moodle-gl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060229" comment="moodle-he less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060230" comment="moodle-hi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060231" comment="moodle-hr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060232" comment="moodle-hu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060233" comment="moodle-id less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060234" comment="moodle-is less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060235" comment="moodle-it less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060236" comment="moodle-ja less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060237" comment="moodle-ka less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060238" comment="moodle-km less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060239" comment="moodle-kn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060240" comment="moodle-ko less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060241" comment="moodle-lt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060242" comment="moodle-lv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060243" comment="moodle-mi_tn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060244" comment="moodle-ms less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060245" comment="moodle-nl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060246" comment="moodle-nn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060247" comment="moodle-no less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060248" comment="moodle-pl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060249" comment="moodle-pt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060250" comment="moodle-ro less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060251" comment="moodle-ru less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060252" comment="moodle-sk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060253" comment="moodle-sl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060254" comment="moodle-so less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060255" comment="moodle-sq less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060256" comment="moodle-sr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060257" comment="moodle-sv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060258" comment="moodle-th less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060259" comment="moodle-tl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060260" comment="moodle-tr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060261" comment="moodle-uk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060262" comment="moodle-vi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060263" comment="moodle-zh_cn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060264" comment="moodle less than 1.9.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1614</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1614" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Moodle 1.8.x before 1.8.12 and 1.9.x before 1.9.8 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the Login-As feature or (2) when the global search feature is enabled, unspecified global search forms in the Global Search Engine.  NOTE: vector 1 might be resultant from a cross-site request forgery (CSRF) vulnerability.
	</description>
 </metadata>
<!-- 0c81eff79776eef909a6ba171e417267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060210" comment="moodle-af less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060211" comment="moodle-ar less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060212" comment="moodle-be less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060213" comment="moodle-bg less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060214" comment="moodle-bs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060215" comment="moodle-ca less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060216" comment="moodle-cs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060217" comment="moodle-da less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060218" comment="moodle-de less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060219" comment="moodle-de_du less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060220" comment="moodle-el less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060221" comment="moodle-es less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060222" comment="moodle-et less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060223" comment="moodle-eu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060224" comment="moodle-fa less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060225" comment="moodle-fi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060226" comment="moodle-fr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060227" comment="moodle-ga less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060228" comment="moodle-gl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060229" comment="moodle-he less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060230" comment="moodle-hi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060231" comment="moodle-hr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060232" comment="moodle-hu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060233" comment="moodle-id less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060234" comment="moodle-is less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060235" comment="moodle-it less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060236" comment="moodle-ja less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060237" comment="moodle-ka less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060238" comment="moodle-km less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060239" comment="moodle-kn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060240" comment="moodle-ko less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060241" comment="moodle-lt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060242" comment="moodle-lv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060243" comment="moodle-mi_tn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060244" comment="moodle-ms less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060245" comment="moodle-nl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060246" comment="moodle-nn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060247" comment="moodle-no less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060248" comment="moodle-pl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060249" comment="moodle-pt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060250" comment="moodle-ro less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060251" comment="moodle-ru less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060252" comment="moodle-sk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060253" comment="moodle-sl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060254" comment="moodle-so less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060255" comment="moodle-sq less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060256" comment="moodle-sr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060257" comment="moodle-sv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060258" comment="moodle-th less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060259" comment="moodle-tl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060260" comment="moodle-tr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060261" comment="moodle-uk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060262" comment="moodle-vi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060263" comment="moodle-zh_cn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060264" comment="moodle less than 1.9.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1615</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1615" source="CVE"/>
	<description>
	Multiple SQL injection vulnerabilities in Moodle 1.8.x before 1.8.12 and 1.9.x before 1.9.8 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) the add_to_log function in mod/wiki/view.php in the wiki module, or (2) "data validation in some forms elements" related to lib/form/selectgroups.php.
	</description>
 </metadata>
<!-- 0c81eff79776eef909a6ba171e417267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060210" comment="moodle-af less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060211" comment="moodle-ar less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060212" comment="moodle-be less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060213" comment="moodle-bg less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060214" comment="moodle-bs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060215" comment="moodle-ca less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060216" comment="moodle-cs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060217" comment="moodle-da less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060218" comment="moodle-de less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060219" comment="moodle-de_du less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060220" comment="moodle-el less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060221" comment="moodle-es less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060222" comment="moodle-et less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060223" comment="moodle-eu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060224" comment="moodle-fa less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060225" comment="moodle-fi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060226" comment="moodle-fr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060227" comment="moodle-ga less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060228" comment="moodle-gl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060229" comment="moodle-he less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060230" comment="moodle-hi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060231" comment="moodle-hr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060232" comment="moodle-hu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060233" comment="moodle-id less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060234" comment="moodle-is less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060235" comment="moodle-it less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060236" comment="moodle-ja less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060237" comment="moodle-ka less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060238" comment="moodle-km less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060239" comment="moodle-kn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060240" comment="moodle-ko less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060241" comment="moodle-lt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060242" comment="moodle-lv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060243" comment="moodle-mi_tn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060244" comment="moodle-ms less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060245" comment="moodle-nl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060246" comment="moodle-nn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060247" comment="moodle-no less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060248" comment="moodle-pl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060249" comment="moodle-pt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060250" comment="moodle-ro less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060251" comment="moodle-ru less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060252" comment="moodle-sk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060253" comment="moodle-sl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060254" comment="moodle-so less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060255" comment="moodle-sq less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060256" comment="moodle-sr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060257" comment="moodle-sv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060258" comment="moodle-th less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060259" comment="moodle-tl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060260" comment="moodle-tr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060261" comment="moodle-uk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060262" comment="moodle-vi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060263" comment="moodle-zh_cn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060264" comment="moodle less than 1.9.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1616</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1616" source="CVE"/>
	<description>
	Moodle 1.8.x and 1.9.x before 1.9.8 can create new roles when restoring a course, which allows teachers to create new accounts even if they do not have the moodle/user:create capability.
	</description>
 </metadata>
<!-- 0c81eff79776eef909a6ba171e417267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060210" comment="moodle-af less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060211" comment="moodle-ar less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060212" comment="moodle-be less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060213" comment="moodle-bg less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060214" comment="moodle-bs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060215" comment="moodle-ca less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060216" comment="moodle-cs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060217" comment="moodle-da less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060218" comment="moodle-de less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060219" comment="moodle-de_du less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060220" comment="moodle-el less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060221" comment="moodle-es less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060222" comment="moodle-et less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060223" comment="moodle-eu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060224" comment="moodle-fa less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060225" comment="moodle-fi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060226" comment="moodle-fr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060227" comment="moodle-ga less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060228" comment="moodle-gl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060229" comment="moodle-he less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060230" comment="moodle-hi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060231" comment="moodle-hr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060232" comment="moodle-hu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060233" comment="moodle-id less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060234" comment="moodle-is less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060235" comment="moodle-it less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060236" comment="moodle-ja less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060237" comment="moodle-ka less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060238" comment="moodle-km less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060239" comment="moodle-kn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060240" comment="moodle-ko less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060241" comment="moodle-lt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060242" comment="moodle-lv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060243" comment="moodle-mi_tn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060244" comment="moodle-ms less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060245" comment="moodle-nl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060246" comment="moodle-nn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060247" comment="moodle-no less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060248" comment="moodle-pl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060249" comment="moodle-pt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060250" comment="moodle-ro less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060251" comment="moodle-ru less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060252" comment="moodle-sk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060253" comment="moodle-sl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060254" comment="moodle-so less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060255" comment="moodle-sq less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060256" comment="moodle-sr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060257" comment="moodle-sv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060258" comment="moodle-th less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060259" comment="moodle-tl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060260" comment="moodle-tr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060261" comment="moodle-uk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060262" comment="moodle-vi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060263" comment="moodle-zh_cn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060264" comment="moodle less than 1.9.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1617</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1617" source="CVE"/>
	<description>
	user/view.php in Moodle 1.8.x before 1.8.12 and 1.9.x before 1.9.8 does not properly check a role, which allows remote authenticated users to obtain the full names of other users via the course profile page.
	</description>
 </metadata>
<!-- 0c81eff79776eef909a6ba171e417267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060210" comment="moodle-af less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060211" comment="moodle-ar less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060212" comment="moodle-be less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060213" comment="moodle-bg less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060214" comment="moodle-bs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060215" comment="moodle-ca less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060216" comment="moodle-cs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060217" comment="moodle-da less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060218" comment="moodle-de less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060219" comment="moodle-de_du less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060220" comment="moodle-el less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060221" comment="moodle-es less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060222" comment="moodle-et less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060223" comment="moodle-eu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060224" comment="moodle-fa less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060225" comment="moodle-fi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060226" comment="moodle-fr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060227" comment="moodle-ga less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060228" comment="moodle-gl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060229" comment="moodle-he less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060230" comment="moodle-hi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060231" comment="moodle-hr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060232" comment="moodle-hu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060233" comment="moodle-id less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060234" comment="moodle-is less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060235" comment="moodle-it less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060236" comment="moodle-ja less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060237" comment="moodle-ka less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060238" comment="moodle-km less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060239" comment="moodle-kn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060240" comment="moodle-ko less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060241" comment="moodle-lt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060242" comment="moodle-lv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060243" comment="moodle-mi_tn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060244" comment="moodle-ms less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060245" comment="moodle-nl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060246" comment="moodle-nn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060247" comment="moodle-no less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060248" comment="moodle-pl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060249" comment="moodle-pt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060250" comment="moodle-ro less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060251" comment="moodle-ru less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060252" comment="moodle-sk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060253" comment="moodle-sl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060254" comment="moodle-so less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060255" comment="moodle-sq less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060256" comment="moodle-sr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060257" comment="moodle-sv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060258" comment="moodle-th less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060259" comment="moodle-tl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060260" comment="moodle-tr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060261" comment="moodle-uk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060262" comment="moodle-vi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060263" comment="moodle-zh_cn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060264" comment="moodle less than 1.9.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1618</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1618" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the phpCAS client library before 1.1.0, as used in Moodle 1.8.x before 1.8.12 and 1.9.x before 1.9.8, allows remote attackers to inject arbitrary web script or HTML via a crafted URL, which is not properly handled in an error message.
	</description>
 </metadata>
<!-- 0c81eff79776eef909a6ba171e417267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060210" comment="moodle-af less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060211" comment="moodle-ar less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060212" comment="moodle-be less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060213" comment="moodle-bg less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060214" comment="moodle-bs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060215" comment="moodle-ca less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060216" comment="moodle-cs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060217" comment="moodle-da less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060218" comment="moodle-de less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060219" comment="moodle-de_du less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060220" comment="moodle-el less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060221" comment="moodle-es less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060222" comment="moodle-et less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060223" comment="moodle-eu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060224" comment="moodle-fa less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060225" comment="moodle-fi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060226" comment="moodle-fr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060227" comment="moodle-ga less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060228" comment="moodle-gl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060229" comment="moodle-he less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060230" comment="moodle-hi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060231" comment="moodle-hr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060232" comment="moodle-hu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060233" comment="moodle-id less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060234" comment="moodle-is less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060235" comment="moodle-it less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060236" comment="moodle-ja less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060237" comment="moodle-ka less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060238" comment="moodle-km less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060239" comment="moodle-kn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060240" comment="moodle-ko less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060241" comment="moodle-lt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060242" comment="moodle-lv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060243" comment="moodle-mi_tn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060244" comment="moodle-ms less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060245" comment="moodle-nl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060246" comment="moodle-nn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060247" comment="moodle-no less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060248" comment="moodle-pl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060249" comment="moodle-pt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060250" comment="moodle-ro less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060251" comment="moodle-ru less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060252" comment="moodle-sk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060253" comment="moodle-sl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060254" comment="moodle-so less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060255" comment="moodle-sq less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060256" comment="moodle-sr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060257" comment="moodle-sv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060258" comment="moodle-th less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060259" comment="moodle-tl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060260" comment="moodle-tr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060261" comment="moodle-uk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060262" comment="moodle-vi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060263" comment="moodle-zh_cn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060264" comment="moodle less than 1.9.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1619</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1619" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the fix_non_standard_entities function in the KSES HTML text cleaning library (weblib.php), as used in Moodle 1.8.x before 1.8.12 and 1.9.x before 1.9.8, allows remote attackers to inject arbitrary web script or HTML via crafted HTML entities.
	</description>
 </metadata>
<!-- 0c81eff79776eef909a6ba171e417267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060210" comment="moodle-af less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060211" comment="moodle-ar less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060212" comment="moodle-be less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060213" comment="moodle-bg less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060214" comment="moodle-bs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060215" comment="moodle-ca less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060216" comment="moodle-cs less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060217" comment="moodle-da less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060218" comment="moodle-de less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060219" comment="moodle-de_du less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060220" comment="moodle-el less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060221" comment="moodle-es less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060222" comment="moodle-et less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060223" comment="moodle-eu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060224" comment="moodle-fa less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060225" comment="moodle-fi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060226" comment="moodle-fr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060227" comment="moodle-ga less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060228" comment="moodle-gl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060229" comment="moodle-he less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060230" comment="moodle-hi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060231" comment="moodle-hr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060232" comment="moodle-hu less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060233" comment="moodle-id less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060234" comment="moodle-is less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060235" comment="moodle-it less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060236" comment="moodle-ja less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060237" comment="moodle-ka less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060238" comment="moodle-km less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060239" comment="moodle-kn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060240" comment="moodle-ko less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060241" comment="moodle-lt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060242" comment="moodle-lv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060243" comment="moodle-mi_tn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060244" comment="moodle-ms less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060245" comment="moodle-nl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060246" comment="moodle-nn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060247" comment="moodle-no less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060248" comment="moodle-pl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060249" comment="moodle-pt less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060250" comment="moodle-ro less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060251" comment="moodle-ru less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060252" comment="moodle-sk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060253" comment="moodle-sl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060254" comment="moodle-so less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060255" comment="moodle-sq less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060256" comment="moodle-sr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060257" comment="moodle-sv less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060258" comment="moodle-th less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060259" comment="moodle-tl less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060260" comment="moodle-tr less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060261" comment="moodle-uk less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060262" comment="moodle-vi less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060263" comment="moodle-zh_cn less than 1.9.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060264" comment="moodle less than 1.9.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1626</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1626" source="CVE"/>
	<description>
	MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.
	</description>
 </metadata>
<!-- dc5c431e781c685bb610b6d2a2ec8ee2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063568" comment="libmysqlclient-devel less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063569" comment="libmysqlclient15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063570" comment="libmysqlclient15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063571" comment="libmysqlclient15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063572" comment="libmysqlclient_r15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063573" comment="libmysqlclient_r15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063574" comment="libmysqlclient_r15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063575" comment="mysql-Max less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063576" comment="mysql-bench less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063577" comment="mysql-client less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063578" comment="mysql-debug less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063579" comment="mysql-test less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063580" comment="mysql-tools less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063581" comment="mysql less than 5.0.67-12.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1628</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1628" source="CVE"/>
	<description>
	Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter.
	</description>
 </metadata>
<!-- 742167e27a88dcad3263fc988ddf988e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061932" comment="ghostscript-devel less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061933" comment="ghostscript-fonts-other less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061934" comment="ghostscript-fonts-rus less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061935" comment="ghostscript-fonts-std less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061936" comment="ghostscript-ijs-devel less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061937" comment="ghostscript-library less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061938" comment="ghostscript-omni less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061939" comment="ghostscript-x11 less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061940" comment="libgimpprint-devel less than 4.2.7-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061941" comment="libgimpprint less than 4.2.7-31.44.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1639</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1639" source="CVE"/>
	<description>
	The cli_pdf function in libclamav/pdf.c in ClamAV before 0.96.1 allows remote attackers to cause a denial of service (crash) via a malformed PDF file, related to an inconsistency in the calculated stream length and the real stream length.
	</description>
 </metadata>
<!-- 53dcf86ccf9ceb31c9c34c9897f38f21 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061756" comment="clamav-db less than 0.96.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061754" comment="clamav less than 0.96.1-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1640</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1640" source="CVE"/>
	<description>
	Off-by-one error in the parseicon function in libclamav/pe_icons.c in ClamAV 0.96 allows remote attackers to cause a denial of service (crash) via a crafted PE icon that triggers an out-of-bounds read, related to improper rounding during scaling.
	</description>
 </metadata>
<!-- 53dcf86ccf9ceb31c9c34c9897f38f21 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061756" comment="clamav-db less than 0.96.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061754" comment="clamav less than 0.96.1-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1641</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1641" source="CVE"/>
	<description>
	The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
	</description>
 </metadata>
<!-- 574a4c9c3e74805d1c0c29cf29aa4953 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061671" comment="kernel-debug-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061672" comment="kernel-debug-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061673" comment="kernel-debug less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061674" comment="kernel-default-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061675" comment="kernel-default-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061676" comment="kernel-default less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061677" comment="kernel-docs less than 2.6.3-3.13.109"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061678" comment="kernel-kdump less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061679" comment="kernel-pae-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061680" comment="kernel-pae-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061681" comment="kernel-pae less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061682" comment="kernel-ppc64-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061683" comment="kernel-ppc64-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061684" comment="kernel-ppc64 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061685" comment="kernel-ps3 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061686" comment="kernel-source less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061687" comment="kernel-syms less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061688" comment="kernel-trace-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061689" comment="kernel-trace-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061690" comment="kernel-trace less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061691" comment="kernel-vanilla less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061692" comment="kernel-xen-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061693" comment="kernel-xen-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061694" comment="kernel-xen less than 2.6.27.48-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1643</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1643" source="CVE"/>
	<description>
	mm/shmem.c in the Linux kernel before 2.6.28-rc3, when strict overcommit is enabled, does not properly handle the export of shmemfs objects by knfsd, which allows attackers to cause a denial of service (NULL pointer dereference and knfsd crash) or possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
<!-- 574a4c9c3e74805d1c0c29cf29aa4953 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061671" comment="kernel-debug-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061672" comment="kernel-debug-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061673" comment="kernel-debug less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061674" comment="kernel-default-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061675" comment="kernel-default-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061676" comment="kernel-default less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061677" comment="kernel-docs less than 2.6.3-3.13.109"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061678" comment="kernel-kdump less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061679" comment="kernel-pae-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061680" comment="kernel-pae-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061681" comment="kernel-pae less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061682" comment="kernel-ppc64-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061683" comment="kernel-ppc64-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061684" comment="kernel-ppc64 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061685" comment="kernel-ps3 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061686" comment="kernel-source less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061687" comment="kernel-syms less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061688" comment="kernel-trace-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061689" comment="kernel-trace-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061690" comment="kernel-trace less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061691" comment="kernel-vanilla less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061692" comment="kernel-xen-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061693" comment="kernel-xen-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061694" comment="kernel-xen less than 2.6.27.48-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1748</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748" source="CVE"/>
	<description>
	The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstrated by the (1) /admin?OP=redirect&amp;URL=% and (2) /admin?URL=/admin/&amp;OP=% URIs.
	</description>
 </metadata>
<!-- b9517c6deeb9b6fb02cdb512c1c8745c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064805" comment="cups-client less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064806" comment="cups-devel less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064807" comment="cups-libs-32bit less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064808" comment="cups-libs-64bit less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064809" comment="cups-libs less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064810" comment="cups less than 1.3.9-7.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1797</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 26745896e174e799eaf04fa8092bc6bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062104" comment="freetype2-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062105" comment="freetype2-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062106" comment="freetype2-devel-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062107" comment="freetype2-devel-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062108" comment="freetype2-devel less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062109" comment="freetype2 less than 2.3.7-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1848</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1848" source="CVE"/>
	<description>
	Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name.
	</description>
 </metadata>
<!-- dc5c431e781c685bb610b6d2a2ec8ee2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063568" comment="libmysqlclient-devel less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063569" comment="libmysqlclient15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063570" comment="libmysqlclient15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063571" comment="libmysqlclient15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063572" comment="libmysqlclient_r15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063573" comment="libmysqlclient_r15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063574" comment="libmysqlclient_r15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063575" comment="mysql-Max less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063576" comment="mysql-bench less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063577" comment="mysql-client less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063578" comment="mysql-debug less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063579" comment="mysql-test less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063580" comment="mysql-tools less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063581" comment="mysql less than 5.0.67-12.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1849</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1849" source="CVE"/>
	<description>
	The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length.
	</description>
 </metadata>
<!-- dc5c431e781c685bb610b6d2a2ec8ee2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063568" comment="libmysqlclient-devel less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063569" comment="libmysqlclient15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063570" comment="libmysqlclient15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063571" comment="libmysqlclient15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063572" comment="libmysqlclient_r15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063573" comment="libmysqlclient_r15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063574" comment="libmysqlclient_r15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063575" comment="mysql-Max less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063576" comment="mysql-bench less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063577" comment="mysql-client less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063578" comment="mysql-debug less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063579" comment="mysql-test less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063580" comment="mysql-tools less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063581" comment="mysql less than 5.0.67-12.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1850</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1850" source="CVE"/>
	<description>
	Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name.
	</description>
 </metadata>
<!-- dc5c431e781c685bb610b6d2a2ec8ee2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063568" comment="libmysqlclient-devel less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063569" comment="libmysqlclient15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063570" comment="libmysqlclient15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063571" comment="libmysqlclient15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063572" comment="libmysqlclient_r15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063573" comment="libmysqlclient_r15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063574" comment="libmysqlclient_r15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063575" comment="mysql-Max less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063576" comment="mysql-bench less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063577" comment="mysql-client less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063578" comment="mysql-debug less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063579" comment="mysql-test less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063580" comment="mysql-tools less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063581" comment="mysql less than 5.0.67-12.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1860</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1860" source="CVE"/>
	<description>
	The html_entity_decode function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal call, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1862</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1862" source="CVE"/>
	<description>
	The chunk_split function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1864</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1864" source="CVE"/>
	<description>
	The addcslashes function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1869</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1869" source="CVE"/>
	<description>
	Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file.
	</description>
 </metadata>
<!-- 742167e27a88dcad3263fc988ddf988e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061932" comment="ghostscript-devel less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061933" comment="ghostscript-fonts-other less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061934" comment="ghostscript-fonts-rus less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061935" comment="ghostscript-fonts-std less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061936" comment="ghostscript-ijs-devel less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061937" comment="ghostscript-library less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061938" comment="ghostscript-omni less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061939" comment="ghostscript-x11 less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061940" comment="libgimpprint-devel less than 4.2.7-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061941" comment="libgimpprint less than 4.2.7-31.44.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1914</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1914" source="CVE"/>
	<description>
	The Zend Engine in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information by interrupting the handler for the (1) ZEND_BW_XOR opcode (shift_left_function), (2) ZEND_SL opcode (bitwise_xor_function), or (3) ZEND_SR opcode (shift_right_function), related to the convert_to_long_base function.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1915</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1915" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1915" source="CVE"/>
	<description>
	The preg_quote function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature, modification of ZVALs whose values are not updated in the associated local variables, and access of previously-freed memory.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1917</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1917" source="CVE"/>
	<description>
	Stack consumption vulnerability in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to cause a denial of service (PHP crash) via a crafted first argument to the fnmatch function, as demonstrated using a long string.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1975</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1975" source="CVE"/>
	<description>
	PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, and 8.4 before 8.4.4 does not properly check privileges during certain RESET ALL operations, which allows remote authenticated users to remove arbitrary parameter settings via a (1) ALTER USER or (2) ALTER DATABASE statement.
	</description>
 </metadata>
<!-- 899579e6feb8563f5e72bf79a2b3768c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061271" comment="postgresql-contrib less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061293" comment="postgresql-devel less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061272" comment="postgresql-docs less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061273" comment="postgresql-libs-32bit less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061315" comment="postgresql-libs-64bit less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061275" comment="postgresql-libs less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061316" comment="postgresql-plperl less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061317" comment="postgresql-plpython less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061318" comment="postgresql-pltcl less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061276" comment="postgresql-server less than 8.3.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061277" comment="postgresql less than 8.3.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1993</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-1993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1993" source="CVE"/>
	<description>
	Opera 9.52 does not properly handle an IFRAME element with a mailto: URL in its SRC attribute, which allows remote attackers to cause a denial of service (resource consumption) via an HTML document with many IFRAME elements.
	</description>
 </metadata>
<!-- 73fe5fc7ef96164ae38c3be292808ef2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061279" comment="opera less than 10.60-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2023</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2023" source="CVE"/>
	<description>
	transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
	</description>
 </metadata>
<!-- 8daa9a03826aef95669a5b369077f153 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061775" comment="exim less than 4.69-70.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061776" comment="eximon less than 4.69-70.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061777" comment="eximstats-html less than 4.69-70.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2024</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2024" source="CVE"/>
	<description>
	transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
	</description>
 </metadata>
<!-- 8daa9a03826aef95669a5b369077f153 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061775" comment="exim less than 4.69-70.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061776" comment="eximon less than 4.69-70.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061777" comment="eximstats-html less than 4.69-70.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2055</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2055" source="CVE"/>
	<description>
	Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program.
	</description>
 </metadata>
<!-- 742167e27a88dcad3263fc988ddf988e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061932" comment="ghostscript-devel less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061933" comment="ghostscript-fonts-other less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061934" comment="ghostscript-fonts-rus less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061935" comment="ghostscript-fonts-std less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061936" comment="ghostscript-ijs-devel less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061937" comment="ghostscript-library less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061938" comment="ghostscript-omni less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061939" comment="ghostscript-x11 less than 8.62-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061940" comment="libgimpprint-devel less than 4.2.7-31.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061941" comment="libgimpprint less than 4.2.7-31.44.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2059</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2059" source="CVE"/>
	<description>
	lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
	</description>
 </metadata>
<!-- f5dfc90a1cde762fb5e57175eac41a99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062723" comment="popt-32bit less than 1.7-20.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062724" comment="popt-64bit less than 1.7-20.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062725" comment="popt-devel less than 1.7-20.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062726" comment="popt less than 1.7-20.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062727" comment="rpm-32bit less than 4.4.2.3-20.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062728" comment="rpm-64bit less than 4.4.2.3-20.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062729" comment="rpm-devel-static less than 4.4.2.3-20.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062730" comment="rpm-devel less than 4.4.2.3-20.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062731" comment="rpm less than 4.4.2.3-20.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2063</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063" source="CVE"/>
	<description>
	Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
	</description>
 </metadata>
<!-- 7b8947e2bd94417dd3f038ed911cba0b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053220" comment="cifs-mount less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061031" comment="ldapsmb less than 1.34b-6.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053250" comment="libnetapi-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053251" comment="libnetapi0 less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053252" comment="libsmbclient-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053222" comment="libsmbclient0-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061032" comment="libsmbclient0-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053224" comment="libsmbclient0 less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053253" comment="libsmbsharemodes-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053254" comment="libsmbsharemodes0 less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053255" comment="libtalloc-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053225" comment="libtalloc1-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061033" comment="libtalloc1-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053227" comment="libtalloc1 less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053256" comment="libtdb-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053228" comment="libtdb1-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061034" comment="libtdb1-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053230" comment="libtdb1 less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053257" comment="libwbclient-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053231" comment="libwbclient0-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061035" comment="libwbclient0-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053233" comment="libwbclient0 less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053234" comment="samba-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061036" comment="samba-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053235" comment="samba-client-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061037" comment="samba-client-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053237" comment="samba-client less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053258" comment="samba-devel less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053238" comment="samba-krb-printing less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061038" comment="samba-vscan less than 0.3.6b-6.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053239" comment="samba-winbind-32bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061039" comment="samba-winbind-64bit less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053241" comment="samba-winbind less than 3.2.7-11.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053243" comment="samba less than 3.2.7-11.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2074</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2074" source="CVE"/>
	<description>
	istream.c in w3m 0.5.2 and possibly other versions, when ssl_verify_server is enabled, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- ff8769e766d1089fd9a64aa5f25ca888 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061699" comment="w3m-inline-image less than 0.5.2-128.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061700" comment="w3m less than 0.5.2-128.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2077</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2077" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-1640.  Reason: This candidate is a duplicate of CVE-2010-1640.  Notes: All CVE users should reference CVE-2010-1640 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 53dcf86ccf9ceb31c9c34c9897f38f21 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061756" comment="clamav-db less than 0.96.1-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061754" comment="clamav less than 0.96.1-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2093</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2093" source="CVE"/>
	<description>
	Use-after-free vulnerability in the request shutdown functionality in PHP 5.2 before 5.2.13 and 5.3 before 5.3.2 allows context-dependent attackers to cause a denial of service (crash) via a stream context structure that is freed before destruction occurs.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2094</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2094" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the phar extension in PHP 5.3 before 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the (1) phar_stream_flush, (2) phar_wrapper_unlink, (3) phar_parse_url, or (4) phar_wrapper_open_url functions in ext/phar/stream.c; and the (5) phar_wrapper_open_dir function in ext/phar/dirstream.c, which triggers errors in the php_stream_wrapper_log_error function.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2097</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2097" source="CVE"/>
	<description>
	The (1) iconv_mime_decode, (2) iconv_substr, and (3) iconv_mime_encode functions in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2100</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2100" source="CVE"/>
	<description>
	The (1) htmlentities, (2) htmlspecialchars, (3) str_getcsv, (4) http_build_query, (5) strpbrk, and (6) strtr functions in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2101</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2101" source="CVE"/>
	<description>
	The (1) strip_tags, (2) setcookie, (3) strtok, (4) wordwrap, (5) str_word_count, and (6) str_pad functions in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2160</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2160" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an invalid offset in an unspecified undocumented opcode in ActionScript Virtual Machine 2, related to getouterscope, a different vulnerability than CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2161</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2161" source="CVE"/>
	<description>
	Array index error in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified "types of Adobe Flash code."
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2162</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2162" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code via vectors related to improper length calculation and the (1) STSC, (2) STSZ, and (3) STCO atoms.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2163</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2163" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2164</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2164" source="CVE"/>
	<description>
	Use-after-free vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors related to an unspecified "image type within a certain function."
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2165</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2165" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2166</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2166" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2167</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2167" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors related to malformed (1) GIF or (2) JPEG data.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2168</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2168" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content, involving the newfunction (0x44) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2201.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2169</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2169" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allow attackers to cause a denial of service (pointer memory corruption) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2170</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2170" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2181 and CVE-2010-2183.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2171</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2171" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via vectors related to SWF files, decompression of embedded JPEG image data, and the DefineBits and other unspecified tags, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2172</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2172" source="CVE"/>
	<description>
	Adobe Flash Player 9 before 9.0.277.0 on unspecified UNIX platforms allows attackers to cause a denial of service via unknown vectors.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2173</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2173" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, related to an "invalid pointer vulnerability" and the newclass (0x58) operator, a different vulnerability than CVE-2010-2174.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2174</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2174" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, related to an "invalid pointer vulnerability" and the newfunction (0x44) operator, a different vulnerability than CVE-2010-2173.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2175</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2175" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2176</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2176" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2177</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2177" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2178</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2178" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2179</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2179" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, when Firefox or Chrome is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to URL parsing.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2180</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2180" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2181</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2181" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2170 and CVE-2010-2183.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2182</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2182" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2183</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2183" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2170 and CVE-2010-2181.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2184</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2184" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2185</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2185" source="CVE"/>
	<description>
	Buffer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2186</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2186" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2187</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2187" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, and CVE-2010-2188.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2188</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2188" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by calling the ActionScript native object 2200 connect method multiple times with different arguments, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, and CVE-2010-2187.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
	</criteria>
	<!-- 6dc0f226897e2807f0d495db198a2c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- cf42df06792fbc140654995f11bbcd1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062172" comment="acroread-cmaps less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062173" comment="acroread-fonts-ja less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062174" comment="acroread-fonts-ko less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062175" comment="acroread-fonts-zh_CN less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062176" comment="acroread-fonts-zh_TW less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062177" comment="acroread less than 9.3.4-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2189</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2189" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, when used in conjunction with VMWare Tools on a VMWare platform, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 16e8d313fc9bc48d65e0edfb97c000df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2190</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2190" source="CVE"/>
	<description>
	The (1) trim, (2) ltrim, (3) rtrim, and (4) substr_replace functions in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2191</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2191" source="CVE"/>
	<description>
	The (1) parse_str, (2) preg_match, (3) unpack, and (4) pack functions; the (5) ZEND_FETCH_RW, (6) ZEND_CONCAT, and (7) ZEND_ASSIGN_CONCAT opcodes; and the (8) ArrayObject::uasort method in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal function or handler.  NOTE: vectors 2 through 4 are related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2201</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2201" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content involving the (1) pushstring (0x2C) operator, (2) debugfile (0xF1) operator, and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2168.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2202</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2202" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2203</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2203" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3 on UNIX allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2204</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2204" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2205</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2205" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, access uninitialized memory, which allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2206</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2206" source="CVE"/>
	<description>
	Array index error in AcroForm.api in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted GIF image in a PDF file, which bypasses a size check and triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2207</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2207" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2208</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2208" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, dereference a heap object after this object's deletion, which allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2209</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2209" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2210</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2210" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2211</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2211" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2212.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2212</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2212" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PDF file containing Flash content with a crafted #1023 (3FFh) tag, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2211.
	</description>
 </metadata>
<!-- b022c5d4675fec8f6a6f0dbc0d174533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061201" comment="acroread-cmaps less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061202" comment="acroread-fonts-ja less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061203" comment="acroread-fonts-ko less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061204" comment="acroread-fonts-zh_CN less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061205" comment="acroread-fonts-zh_TW less than 9.3.3-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061206" comment="acroread less than 9.3.3-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2213</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2213" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2214, and CVE-2010-2216.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6dc0f226897e2807f0d495db198a2c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- cf42df06792fbc140654995f11bbcd1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062172" comment="acroread-cmaps less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062173" comment="acroread-fonts-ja less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062174" comment="acroread-fonts-ko less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062175" comment="acroread-fonts-zh_CN less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062176" comment="acroread-fonts-zh_TW less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062177" comment="acroread less than 9.3.4-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2214</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2214" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2213, and CVE-2010-2216.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6dc0f226897e2807f0d495db198a2c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- cf42df06792fbc140654995f11bbcd1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062172" comment="acroread-cmaps less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062173" comment="acroread-fonts-ja less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062174" comment="acroread-fonts-ko less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062175" comment="acroread-fonts-zh_CN less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062176" comment="acroread-fonts-zh_TW less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062177" comment="acroread less than 9.3.4-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2215</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2215" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to trick a user into (1) selecting a link or (2) completing a dialog, related to a "click-jacking" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6dc0f226897e2807f0d495db198a2c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- cf42df06792fbc140654995f11bbcd1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062172" comment="acroread-cmaps less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062173" comment="acroread-fonts-ja less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062174" comment="acroread-fonts-ko less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062175" comment="acroread-fonts-zh_CN less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062176" comment="acroread-fonts-zh_TW less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062177" comment="acroread less than 9.3.4-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2216</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2216" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2213, and CVE-2010-2214.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6dc0f226897e2807f0d495db198a2c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- cf42df06792fbc140654995f11bbcd1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062172" comment="acroread-cmaps less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062173" comment="acroread-fonts-ja less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062174" comment="acroread-fonts-ko less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062175" comment="acroread-fonts-zh_CN less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062176" comment="acroread-fonts-zh_TW less than 9.3.4-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062177" comment="acroread less than 9.3.4-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2221</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2221" source="CVE"/>
	<description>
	Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4db9a1c6f547129a7ba0b581d6254caa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062614" comment="iscsitarget-kmp-debug less than 0.4.15_2.6.27.48_0.2-89.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062615" comment="iscsitarget-kmp-default less than 0.4.15_2.6.27.48_0.2-89.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062616" comment="iscsitarget-kmp-pae less than 0.4.15_2.6.27.48_0.2-89.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062617" comment="iscsitarget-kmp-trace less than 0.4.15_2.6.27.48_0.2-89.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062618" comment="iscsitarget-kmp-xen less than 0.4.15_2.6.27.48_0.2-89.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062619" comment="iscsitarget less than 0.4.15-89.12.1"/>
		</criteria>
	</criteria>
	<!-- 9b74cdb843432feb8f09b3e35de01b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062621" comment="tgt less than 0.9.0-1.19.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2225</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2225" source="CVE"/>
	<description>
	Use-after-free vulnerability in the SplObjectStorage unserializer in PHP 5.2.x and 5.3.x through 5.3.2 allows remote attackers to execute arbitrary code or obtain sensitive information via serialized data, related to the PHP unserialize function.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2227</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2227" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with "recycling of a buffer."
	</description>
 </metadata>
<!-- bb5b71fd7148a30e8daa6e27f0034bd5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062701" comment="tomcat6-admin-webapps less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062702" comment="tomcat6-docs-webapp less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062703" comment="tomcat6-javadoc less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062704" comment="tomcat6-jsp-2_1-api less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062705" comment="tomcat6-lib less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062706" comment="tomcat6-servlet-2_5-api less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062707" comment="tomcat6-webapps less than 6.0.18-16.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062708" comment="tomcat6 less than 6.0.18-16.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2228</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2228" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the MNET access-control interface in Moodle before 1.8.13 and 1.9.x before 1.9.9 allows remote attackers to inject arbitrary web script or HTML via vectors involving extended characters in a username.
	</description>
 </metadata>
<!-- 6a1b83e76c19f1f0ea24434c998950cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061374" comment="moodle-af less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061375" comment="moodle-ar less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061376" comment="moodle-be less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061377" comment="moodle-bg less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061378" comment="moodle-bs less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061379" comment="moodle-ca less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061380" comment="moodle-cs less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061381" comment="moodle-da less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061382" comment="moodle-de less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061383" comment="moodle-de_du less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061384" comment="moodle-el less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061385" comment="moodle-es less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061386" comment="moodle-et less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061387" comment="moodle-eu less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061388" comment="moodle-fa less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061389" comment="moodle-fi less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061390" comment="moodle-fr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061391" comment="moodle-ga less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061392" comment="moodle-gl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061393" comment="moodle-he less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061394" comment="moodle-hi less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061395" comment="moodle-hr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061396" comment="moodle-hu less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061397" comment="moodle-id less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061398" comment="moodle-is less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061399" comment="moodle-it less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061400" comment="moodle-ja less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061401" comment="moodle-ka less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061402" comment="moodle-km less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061403" comment="moodle-kn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061404" comment="moodle-ko less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061405" comment="moodle-lt less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061406" comment="moodle-lv less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061407" comment="moodle-mi_tn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061408" comment="moodle-ms less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061409" comment="moodle-nl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061410" comment="moodle-nn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061411" comment="moodle-no less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061412" comment="moodle-pl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061413" comment="moodle-pt less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061414" comment="moodle-ro less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061415" comment="moodle-ru less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061416" comment="moodle-sk less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061417" comment="moodle-sl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061418" comment="moodle-so less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061419" comment="moodle-sq less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061420" comment="moodle-sr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061421" comment="moodle-sv less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061422" comment="moodle-th less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061423" comment="moodle-tl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061424" comment="moodle-tr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061425" comment="moodle-uk less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061426" comment="moodle-vi less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061427" comment="moodle-zh_cn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061428" comment="moodle less than 1.9.9-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2229</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2229" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in blog/index.php in Moodle before 1.8.13 and 1.9.x before 1.9.9 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters.
	</description>
 </metadata>
<!-- 6a1b83e76c19f1f0ea24434c998950cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061374" comment="moodle-af less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061375" comment="moodle-ar less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061376" comment="moodle-be less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061377" comment="moodle-bg less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061378" comment="moodle-bs less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061379" comment="moodle-ca less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061380" comment="moodle-cs less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061381" comment="moodle-da less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061382" comment="moodle-de less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061383" comment="moodle-de_du less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061384" comment="moodle-el less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061385" comment="moodle-es less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061386" comment="moodle-et less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061387" comment="moodle-eu less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061388" comment="moodle-fa less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061389" comment="moodle-fi less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061390" comment="moodle-fr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061391" comment="moodle-ga less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061392" comment="moodle-gl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061393" comment="moodle-he less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061394" comment="moodle-hi less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061395" comment="moodle-hr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061396" comment="moodle-hu less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061397" comment="moodle-id less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061398" comment="moodle-is less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061399" comment="moodle-it less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061400" comment="moodle-ja less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061401" comment="moodle-ka less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061402" comment="moodle-km less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061403" comment="moodle-kn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061404" comment="moodle-ko less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061405" comment="moodle-lt less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061406" comment="moodle-lv less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061407" comment="moodle-mi_tn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061408" comment="moodle-ms less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061409" comment="moodle-nl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061410" comment="moodle-nn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061411" comment="moodle-no less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061412" comment="moodle-pl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061413" comment="moodle-pt less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061414" comment="moodle-ro less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061415" comment="moodle-ru less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061416" comment="moodle-sk less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061417" comment="moodle-sl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061418" comment="moodle-so less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061419" comment="moodle-sq less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061420" comment="moodle-sr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061421" comment="moodle-sv less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061422" comment="moodle-th less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061423" comment="moodle-tl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061424" comment="moodle-tr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061425" comment="moodle-uk less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061426" comment="moodle-vi less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061427" comment="moodle-zh_cn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061428" comment="moodle less than 1.9.9-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2230</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2230" source="CVE"/>
	<description>
	The KSES text cleaning filter in lib/weblib.php in Moodle before 1.8.13 and 1.9.x before 1.9.9 does not properly handle vbscript URIs, which allows remote authenticated users to conduct cross-site scripting (XSS) attacks via HTML input.
	</description>
 </metadata>
<!-- 6a1b83e76c19f1f0ea24434c998950cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061374" comment="moodle-af less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061375" comment="moodle-ar less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061376" comment="moodle-be less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061377" comment="moodle-bg less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061378" comment="moodle-bs less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061379" comment="moodle-ca less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061380" comment="moodle-cs less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061381" comment="moodle-da less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061382" comment="moodle-de less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061383" comment="moodle-de_du less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061384" comment="moodle-el less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061385" comment="moodle-es less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061386" comment="moodle-et less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061387" comment="moodle-eu less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061388" comment="moodle-fa less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061389" comment="moodle-fi less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061390" comment="moodle-fr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061391" comment="moodle-ga less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061392" comment="moodle-gl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061393" comment="moodle-he less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061394" comment="moodle-hi less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061395" comment="moodle-hr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061396" comment="moodle-hu less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061397" comment="moodle-id less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061398" comment="moodle-is less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061399" comment="moodle-it less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061400" comment="moodle-ja less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061401" comment="moodle-ka less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061402" comment="moodle-km less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061403" comment="moodle-kn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061404" comment="moodle-ko less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061405" comment="moodle-lt less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061406" comment="moodle-lv less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061407" comment="moodle-mi_tn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061408" comment="moodle-ms less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061409" comment="moodle-nl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061410" comment="moodle-nn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061411" comment="moodle-no less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061412" comment="moodle-pl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061413" comment="moodle-pt less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061414" comment="moodle-ro less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061415" comment="moodle-ru less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061416" comment="moodle-sk less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061417" comment="moodle-sl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061418" comment="moodle-so less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061419" comment="moodle-sq less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061420" comment="moodle-sr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061421" comment="moodle-sv less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061422" comment="moodle-th less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061423" comment="moodle-tl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061424" comment="moodle-tr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061425" comment="moodle-uk less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061426" comment="moodle-vi less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061427" comment="moodle-zh_cn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061428" comment="moodle less than 1.9.9-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2231</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2231" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in report/overview/report.php in the quiz module in Moodle before 1.8.13 and 1.9.x before 1.9.9 allows remote attackers to hijack the authentication of arbitrary users for requests that delete quiz attempts via the attemptid parameter.
	</description>
 </metadata>
<!-- 6a1b83e76c19f1f0ea24434c998950cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061374" comment="moodle-af less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061375" comment="moodle-ar less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061376" comment="moodle-be less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061377" comment="moodle-bg less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061378" comment="moodle-bs less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061379" comment="moodle-ca less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061380" comment="moodle-cs less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061381" comment="moodle-da less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061382" comment="moodle-de less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061383" comment="moodle-de_du less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061384" comment="moodle-el less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061385" comment="moodle-es less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061386" comment="moodle-et less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061387" comment="moodle-eu less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061388" comment="moodle-fa less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061389" comment="moodle-fi less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061390" comment="moodle-fr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061391" comment="moodle-ga less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061392" comment="moodle-gl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061393" comment="moodle-he less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061394" comment="moodle-hi less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061395" comment="moodle-hr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061396" comment="moodle-hu less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061397" comment="moodle-id less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061398" comment="moodle-is less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061399" comment="moodle-it less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061400" comment="moodle-ja less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061401" comment="moodle-ka less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061402" comment="moodle-km less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061403" comment="moodle-kn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061404" comment="moodle-ko less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061405" comment="moodle-lt less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061406" comment="moodle-lv less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061407" comment="moodle-mi_tn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061408" comment="moodle-ms less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061409" comment="moodle-nl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061410" comment="moodle-nn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061411" comment="moodle-no less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061412" comment="moodle-pl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061413" comment="moodle-pt less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061414" comment="moodle-ro less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061415" comment="moodle-ru less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061416" comment="moodle-sk less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061417" comment="moodle-sl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061418" comment="moodle-so less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061419" comment="moodle-sq less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061420" comment="moodle-sr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061421" comment="moodle-sv less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061422" comment="moodle-th less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061423" comment="moodle-tl less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061424" comment="moodle-tr less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061425" comment="moodle-uk less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061426" comment="moodle-vi less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061427" comment="moodle-zh_cn less than 1.9.9-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061428" comment="moodle less than 1.9.9-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2242</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2242" source="CVE"/>
	<description>
	Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree.
	</description>
 </metadata>
<!-- 006be0de717fa7ba75a6903011ed7bf1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062733" comment="libvirt-devel less than 0.4.6-11.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062734" comment="libvirt-doc less than 0.4.6-11.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062735" comment="libvirt-python less than 0.4.6-11.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062736" comment="libvirt less than 0.4.6-11.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2249</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249" source="CVE"/>
	<description>
	Memory leak in pngrutil.c in libpng before 1.2.44, and 1.4.x before 1.4.3, allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks.
	</description>
 </metadata>
<!-- 45015c1d031bee51190b56cabba5905c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062307" comment="libpng-devel-32bit less than 1.2.31-4.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062308" comment="libpng-devel-64bit less than 1.2.31-4.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062309" comment="libpng-devel less than 1.2.31-4.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062310" comment="libpng12-0-32bit less than 1.2.31-4.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062311" comment="libpng12-0-64bit less than 1.2.31-4.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062312" comment="libpng12-0 less than 1.2.31-4.40.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062313" comment="libpng3 less than 1.2.31-4.40.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2251</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2251" source="CVE"/>
	<description>
	The get1 command, as used by lftpget, in LFTP before 4.0.6 does not properly validate a server-provided filename before determining the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
	</description>
 </metadata>
<!-- d149b8184dac12090be8d66efc061f61 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060889" comment="lftp less than 3.6.3-5.68.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2283</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2283" source="CVE"/>
	<description>
	The SMB dissector in Wireshark 0.99.6 through 1.0.13, and 1.2.0 through 1.2.8 allows remote attackers to cause a denial of service (NULL pointer dereference) via unknown vectors.
	</description>
 </metadata>
<!-- c6154f4e14e9cb7679828da0ff02362d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065421" comment="wireshark-devel less than 1.4.2-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065422" comment="wireshark less than 1.4.2-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2284</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2284" source="CVE"/>
	<description>
	Buffer overflow in the ASN.1 BER dissector in Wireshark 0.10.13 through 1.0.13 and 1.2.0 through 1.2.8 has unknown impact and remote attack vectors.
	</description>
 </metadata>
<!-- c6154f4e14e9cb7679828da0ff02362d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065421" comment="wireshark-devel less than 1.4.2-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065422" comment="wireshark less than 1.4.2-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2285</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2285" source="CVE"/>
	<description>
	The SMB PIPE dissector in Wireshark 0.8.20 through 1.0.13 and 1.2.0 through 1.2.8 allows remote attackers to cause a denial of service (NULL pointer dereference) via unknown vectors.
	</description>
 </metadata>
<!-- c6154f4e14e9cb7679828da0ff02362d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065421" comment="wireshark-devel less than 1.4.2-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065422" comment="wireshark less than 1.4.2-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2286</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2286" source="CVE"/>
	<description>
	The SigComp Universal Decompressor Virtual Machine dissector in Wireshark 0.10.7 through 1.0.13 and 1.2.0 through 1.2.8 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- c6154f4e14e9cb7679828da0ff02362d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065421" comment="wireshark-devel less than 1.4.2-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065422" comment="wireshark less than 1.4.2-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2287</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2287" source="CVE"/>
	<description>
	Buffer overflow in the SigComp Universal Decompressor Virtual Machine dissector in Wireshark 0.10.8 through 1.0.13 and 1.2.0 through 1.2.8 has unknown impact and remote attack vectors.
	</description>
 </metadata>
<!-- c6154f4e14e9cb7679828da0ff02362d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065421" comment="wireshark-devel less than 1.4.2-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065422" comment="wireshark less than 1.4.2-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2451</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2451" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the DCC functionality in KVIrc 3.4 and 4.0 have unspecified impact and remote attack vectors.
	</description>
 </metadata>
<!-- b632d7404868da391fcf0ea6e910e1e2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061137" comment="kvirc-devel less than 3.4.2-2.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061138" comment="kvirc less than 3.4.2-2.25.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2452</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2452" source="CVE"/>
	<description>
	Directory traversal vulnerability in the DCC functionality in KVIrc 3.4 and 4.0 allows remote attackers to overwrite arbitrary files via unknown vectors.
	</description>
 </metadata>
<!-- b632d7404868da391fcf0ea6e910e1e2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061137" comment="kvirc-devel less than 3.4.2-2.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061138" comment="kvirc less than 3.4.2-2.25.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2484</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2484" source="CVE"/>
	<description>
	The strrchr function in PHP 5.2 before 5.2.14 allows context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal function or handler.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2494</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2494" source="CVE"/>
	<description>
	Multiple buffer underflows in the base64 decoder in base64.c in (1) bogofilter and (2) bogolexer in bogofilter before 1.2.2 allow remote attackers to cause a denial of service (heap memory corruption and application crash) via an e-mail message with invalid base64 data that begins with an = (equals) character.
	</description>
 </metadata>
<!-- d5355b8a70c7234d0d1a24340f414b4e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061807" comment="bogofilter less than 1.1.1-174.18.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2497</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497" source="CVE"/>
	<description>
	Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 26745896e174e799eaf04fa8092bc6bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062104" comment="freetype2-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062105" comment="freetype2-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062106" comment="freetype2-devel-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062107" comment="freetype2-devel-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062108" comment="freetype2-devel less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062109" comment="freetype2 less than 2.3.7-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2498</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498" source="CVE"/>
	<description>
	The psh_glyph_find_strong_points function in pshinter/pshalgo.c in FreeType before 2.4.0 does not properly implement hinting masks, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted font file that triggers an invalid free operation.
	</description>
 </metadata>
<!-- 26745896e174e799eaf04fa8092bc6bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062104" comment="freetype2-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062105" comment="freetype2-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062106" comment="freetype2-devel-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062107" comment="freetype2-devel-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062108" comment="freetype2-devel less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062109" comment="freetype2 less than 2.3.7-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2499</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499" source="CVE"/>
	<description>
	Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted LaserWriter PS font file with an embedded PFB fragment.
	</description>
 </metadata>
<!-- 26745896e174e799eaf04fa8092bc6bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062104" comment="freetype2-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062105" comment="freetype2-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062106" comment="freetype2-devel-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062107" comment="freetype2-devel-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062108" comment="freetype2-devel less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062109" comment="freetype2 less than 2.3.7-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2500</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500" source="CVE"/>
	<description>
	Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 26745896e174e799eaf04fa8092bc6bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062104" comment="freetype2-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062105" comment="freetype2-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062106" comment="freetype2-devel-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062107" comment="freetype2-devel-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062108" comment="freetype2-devel less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062109" comment="freetype2 less than 2.3.7-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2519</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file.
	</description>
 </metadata>
<!-- 26745896e174e799eaf04fa8092bc6bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062104" comment="freetype2-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062105" comment="freetype2-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062106" comment="freetype2-devel-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062107" comment="freetype2-devel-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062108" comment="freetype2-devel less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062109" comment="freetype2 less than 2.3.7-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2520</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 26745896e174e799eaf04fa8092bc6bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062104" comment="freetype2-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062105" comment="freetype2-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062106" comment="freetype2-devel-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062107" comment="freetype2-devel-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062108" comment="freetype2-devel less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062109" comment="freetype2 less than 2.3.7-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2521</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2521" source="CVE"/>
	<description>
	Multiple buffer overflows in fs/nfsd/nfs4xdr.c in the XDR implementation in the NFS server in the Linux kernel before 2.6.34-rc6 allow remote attackers to cause a denial of service (panic) or possibly execute arbitrary code via a crafted NFSv4 compound WRITE request, related to the read_buf and nfsd4_decode_compound functions.
	</description>
 </metadata>
<!-- 574a4c9c3e74805d1c0c29cf29aa4953 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061671" comment="kernel-debug-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061672" comment="kernel-debug-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061673" comment="kernel-debug less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061674" comment="kernel-default-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061675" comment="kernel-default-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061676" comment="kernel-default less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061677" comment="kernel-docs less than 2.6.3-3.13.109"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061678" comment="kernel-kdump less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061679" comment="kernel-pae-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061680" comment="kernel-pae-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061681" comment="kernel-pae less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061682" comment="kernel-ppc64-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061683" comment="kernel-ppc64-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061684" comment="kernel-ppc64 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061685" comment="kernel-ps3 less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061686" comment="kernel-source less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061687" comment="kernel-syms less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061688" comment="kernel-trace-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061689" comment="kernel-trace-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061690" comment="kernel-trace less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061691" comment="kernel-vanilla less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061692" comment="kernel-xen-base less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061693" comment="kernel-xen-extra less than 2.6.27.48-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061694" comment="kernel-xen less than 2.6.27.48-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2522</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2522" source="CVE"/>
	<description>
	The mipv6 daemon in UMIP 0.4 does not verify that netlink messages originated in the kernel, which allows local users to spoof netlink socket communication via a crafted unicast message.
	</description>
 </metadata>
<!-- aa292ed251e943e5657cebd5c7f4fcf2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063777" comment="mipv6d less than 2.0.2-2.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2523</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2523" source="CVE"/>
	<description>
	Multiple buffer overflows in ha.c in the mipv6 daemon in UMIP 0.4 allow remote attackers to have an unspecified impact via a crafted (1) ND_OPT_PREFIX_INFORMATION or (2) ND_OPT_HOME_AGENT_INFO packet.
	</description>
 </metadata>
<!-- aa292ed251e943e5657cebd5c7f4fcf2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063777" comment="mipv6d less than 2.0.2-2.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2526</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2526" source="CVE"/>
	<description>
	The cluster logical volume manager daemon (clvmd) in lvm2-cluster in LVM2 before 2.02.72, as used in Red Hat Global File System (GFS) and other products, does not verify client credentials upon a socket connection, which allows local users to cause a denial of service (daemon exit or logical-volume change) or possibly have unspecified other impact via crafted control commands.
	</description>
 </metadata>
<!-- 83fa37f9e05667d901651895864e5de7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062742" comment="lvm2-clvm less than 2.02.39-8.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062743" comment="lvm2 less than 2.02.39-8.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2527</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527" source="CVE"/>
	<description>
	Multiple buffer overflows in demo programs in FreeType before 2.4.0 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 26745896e174e799eaf04fa8092bc6bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062104" comment="freetype2-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062105" comment="freetype2-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062106" comment="freetype2-devel-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062107" comment="freetype2-devel-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062108" comment="freetype2-devel less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062109" comment="freetype2 less than 2.3.7-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2531</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2531" source="CVE"/>
	<description>
	The var_export function in PHP 5.2 before 5.2.14 and 5.3 before 5.3.3 flushes the output buffer to the user when certain fatal errors occur, even if display_errors is off, which allows remote attackers to obtain sensitive information by causing the application to exceed limits for memory, execution time, or recursion.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2541</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541" source="CVE"/>
	<description>
	Buffer overflow in ftmulti.c in the ftmulti demo program in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 26745896e174e799eaf04fa8092bc6bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062104" comment="freetype2-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062105" comment="freetype2-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062106" comment="freetype2-devel-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062107" comment="freetype2-devel-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062108" comment="freetype2-devel less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062109" comment="freetype2 less than 2.3.7-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2547</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2547" source="CVE"/>
	<description>
	Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.
	</description>
 </metadata>
<!-- b3712e67d3ab02ccf8377ad5c9667233 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061961" comment="gpg2-lang less than 2.0.9-25.109.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061962" comment="gpg2 less than 2.0.9-25.109.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2548</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2548" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 0dd5e864caa58861d13eb11eec6e74f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062161" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b18-1.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062162" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b18-1.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062163" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b18-1.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062164" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b18-1.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062165" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b18-1.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062166" comment="java-1_6_0-openjdk less than 1.6.0.0_b18-1.2.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2575</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2575" source="CVE"/>
	<description>
	Heap-based buffer overflow in the RLE decompression functionality in the TranscribePalmImageToJPEG function in generators/plucker/inplug/image.cpp in Okular in KDE SC 4.3.0 through 4.5.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted image in a PDB file.
	</description>
 </metadata>
<!-- 37b439436163e073e7df1927e0984c78 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063290" comment="gwenview-lang less than 1.4.2-116.50.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063291" comment="gwenview less than 1.4.2-116.50.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063292" comment="kde4-gwenview less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063293" comment="kde4-kcolorchooser less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063294" comment="kde4-kgamma less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063295" comment="kde4-kio_kamera less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063296" comment="kde4-kolourpaint less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063297" comment="kde4-kruler less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063298" comment="kde4-ksnapshot less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063299" comment="kde4-okular-devel less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063300" comment="kde4-okular less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063301" comment="kdegraphics4 less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063302" comment="libkdcraw7-devel less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063303" comment="libkdcraw7 less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063304" comment="libkexiv2-7-devel less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063305" comment="libkexiv2-7 less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063306" comment="libkipi-devel less than 0.1.6-1.64.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063307" comment="libkipi5-devel less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063308" comment="libkipi5 less than 4.1.3-4.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063309" comment="libksane0 less than 4.1.3-4.8.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2576</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2576" source="CVE"/>
	<description>
	Opera before 10.61 does not properly suppress clicks on download dialogs that became visible after a recent tab change, which allows remote attackers to conduct clickjacking attacks, and consequently execute arbitrary code, via vectors involving (1) closing a tab or (2) hiding a tab, a related issue to CVE-2005-2407.
	</description>
 </metadata>
<!-- fc29e8522bfe42b16ef8fe80ce17ecf6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062048" comment="opera less than 10.61-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2751</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2751" source="CVE"/>
	<description>
	The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
	</description>
 </metadata>
<!-- 532559966d41a61d017d7cca5a7a2b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061815" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061816" comment="MozillaFirefox-translations-common less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061817" comment="MozillaFirefox-translations-other less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061809" comment="MozillaFirefox less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2752</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2752" source="CVE"/>
	<description>
	Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.
	</description>
 </metadata>
<!-- 532559966d41a61d017d7cca5a7a2b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061815" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061816" comment="MozillaFirefox-translations-common less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061817" comment="MozillaFirefox-translations-other less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061809" comment="MozillaFirefox less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2753</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2753" source="CVE"/>
	<description>
	Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 532559966d41a61d017d7cca5a7a2b3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061815" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061816" comment="MozillaFirefox-translations-common less than 3.5.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061817" comment="MozillaFirefox-translations-other less than 3.5.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061809" comment="MozillaFirefox less than 3.5.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2754</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2754" source="CVE"/>
	<description>
	dom/base/nsJSEnvironment.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not properly suppress a script's URL in certain circumstances involving a redirect and an error message, which allows remote attackers to obtain sensitive information about script parameters via a crafted HTML document, related to the window.onerror handler.
	</description>
 </metadata>
<!-- 532559966d41a61d017d7cca5a7a2b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061815" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061816" comment="MozillaFirefox-translations-common less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061817" comment="MozillaFirefox-translations-other less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061809" comment="MozillaFirefox less than 3.5.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2760</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2760" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsTreeSelection function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via vectors involving a XUL tree selection, related to a "dangling pointer vulnerability." NOTE: this issue exists because of an incomplete fix for CVE-2010-2753.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2762</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2762" source="CVE"/>
	<description>
	The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox 3.6.x before 3.6.9 and Thunderbird 3.1.x before 3.1.3 does not properly restrict objects at the end of scope chains, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to a chrome privileged object and a chain ending in an outer object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2763</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2763" source="CVE"/>
	<description>
	The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox before 3.5.12, Thunderbird before 3.0.7, and SeaMonkey before 2.0.7 does not properly restrict scripted functions, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2764</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2764" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict read access to the statusText property of XMLHttpRequest objects, which allows remote attackers to discover the existence of intranet web servers via cross-origin requests.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2765</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2765" source="CVE"/>
	<description>
	Integer overflow in the FRAMESET element implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a large number of values in the cols (aka columns) attribute, leading to a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2766</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2766" source="CVE"/>
	<description>
	The normalizeDocument function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle the removal of DOM nodes during normalization, which might allow remote attackers to execute arbitrary code via vectors involving access to a deleted object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2767</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2767" source="CVE"/>
	<description>
	The navigator.plugins implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle destruction of the DOM plugin array, which might allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted access to the navigator object, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2768</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2768" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict use of the type attribute of an OBJECT element to set a document's charset, which allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms via UTF-7 encoding.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2769</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2769" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allows user-assisted remote attackers to inject arbitrary web script or HTML via a selection that is added to a document in which the designMode property is enabled.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2770</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2770" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 on Mac OS X allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted font in a data: URL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2783</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2783" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 0dd5e864caa58861d13eb11eec6e74f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062161" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b18-1.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062162" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b18-1.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062163" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b18-1.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062164" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b18-1.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062165" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b18-1.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062166" comment="java-1_6_0-openjdk less than 1.6.0.0_b18-1.2.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2785</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2785" source="CVE"/>
	<description>
	The IRC Protocol component in KVIrc 3.x and 4.x before r4693 does not properly handle \ (backslash) characters, which allows remote authenticated users to execute arbitrary CTCP commands via vectors involving \r and \40 sequences, a different vulnerability than CVE-2010-2451 and CVE-2010-2452.
	</description>
 </metadata>
<!-- 5b535cc46f901e718aa899c8998445a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061949" comment="kvirc-devel less than 3.4.2-2.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061950" comment="kvirc less than 3.4.2-2.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2798</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2798" source="CVE"/>
	<description>
	The gfs2_dirent_find_space function in fs/gfs2/dir.c in the Linux kernel before 2.6.35 uses an incorrect size value in calculations associated with sentinel directory entries, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact by renaming a file in a GFS2 filesystem, related to the gfs2_rename function in fs/gfs2/ops_inode.c.
	</description>
 </metadata>
<!-- 56b43ecc0d4c24671a493b072ddc0db8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064139" comment="kernel-debug-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064140" comment="kernel-debug-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064141" comment="kernel-debug less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064142" comment="kernel-default-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064143" comment="kernel-default-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064144" comment="kernel-default less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064145" comment="kernel-docs less than 2.6.3-3.13.122"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064146" comment="kernel-kdump less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064147" comment="kernel-pae-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064148" comment="kernel-pae-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064149" comment="kernel-pae less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064150" comment="kernel-ppc64-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064151" comment="kernel-ppc64-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064152" comment="kernel-ppc64 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064153" comment="kernel-ps3 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064154" comment="kernel-source less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064155" comment="kernel-syms less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064156" comment="kernel-trace-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064157" comment="kernel-trace-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064158" comment="kernel-trace less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064159" comment="kernel-vanilla less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064160" comment="kernel-xen-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064161" comment="kernel-xen-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064162" comment="kernel-xen less than 2.6.27.54-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2803</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2803" source="CVE"/>
	<description>
	The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.
	</description>
 </metadata>
<!-- 56b43ecc0d4c24671a493b072ddc0db8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064139" comment="kernel-debug-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064140" comment="kernel-debug-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064141" comment="kernel-debug less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064142" comment="kernel-default-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064143" comment="kernel-default-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064144" comment="kernel-default less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064145" comment="kernel-docs less than 2.6.3-3.13.122"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064146" comment="kernel-kdump less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064147" comment="kernel-pae-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064148" comment="kernel-pae-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064149" comment="kernel-pae less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064150" comment="kernel-ppc64-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064151" comment="kernel-ppc64-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064152" comment="kernel-ppc64 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064153" comment="kernel-ps3 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064154" comment="kernel-source less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064155" comment="kernel-syms less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064156" comment="kernel-trace-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064157" comment="kernel-trace-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064158" comment="kernel-trace less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064159" comment="kernel-vanilla less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064160" comment="kernel-xen-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064161" comment="kernel-xen-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064162" comment="kernel-xen less than 2.6.27.54-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2805</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805" source="CVE"/>
	<description>
	The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 26745896e174e799eaf04fa8092bc6bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062104" comment="freetype2-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062105" comment="freetype2-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062106" comment="freetype2-devel-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062107" comment="freetype2-devel-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062108" comment="freetype2-devel less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062109" comment="freetype2 less than 2.3.7-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2806</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806" source="CVE"/>
	<description>
	Array index error in the t42_parse_sfnts function in type42/t42parse.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via negative size values for certain strings in FontType42 font files, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 26745896e174e799eaf04fa8092bc6bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062104" comment="freetype2-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062105" comment="freetype2-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062106" comment="freetype2-devel-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062107" comment="freetype2-devel-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062108" comment="freetype2-devel less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062109" comment="freetype2 less than 2.3.7-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2807</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807" source="CVE"/>
	<description>
	FreeType before 2.4.2 uses incorrect integer data types during bounds checking, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 26745896e174e799eaf04fa8092bc6bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062104" comment="freetype2-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062105" comment="freetype2-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062106" comment="freetype2-devel-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062107" comment="freetype2-devel-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062108" comment="freetype2-devel less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062109" comment="freetype2 less than 2.3.7-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2808</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808" source="CVE"/>
	<description>
	Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.
	</description>
 </metadata>
<!-- 26745896e174e799eaf04fa8092bc6bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062104" comment="freetype2-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062105" comment="freetype2-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062106" comment="freetype2-devel-32bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062107" comment="freetype2-devel-64bit less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062108" comment="freetype2-devel less than 2.3.7-24.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062109" comment="freetype2 less than 2.3.7-24.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2862</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2862" source="CVE"/>
	<description>
	Integer overflow in CoolType.dll in Adobe Reader 8.2.3 and 9.3.3, and Acrobat 9.3.3, allows remote attackers to execute arbitrary code via a TrueType font with a large maxCompositePoints value in a Maximum Profile (maxp) table.
	</description>
 </metadata>
<!-- cf42df06792fbc140654995f11bbcd1c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062172" comment="acroread-cmaps less than 9.3.4-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062173" comment="acroread-fonts-ja less than 9.3.4-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062174" comment="acroread-fonts-ko less than 9.3.4-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062175" comment="acroread-fonts-zh_CN less than 9.3.4-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062176" comment="acroread-fonts-zh_TW less than 9.3.4-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062177" comment="acroread less than 9.3.4-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2883</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883" source="CVE"/>
	<description>
	Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2884</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884" source="CVE"/>
	<description>
	Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d69e5e453eb077a610413e892cb2668e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062813" comment="flash-player less than 10.1.85.3-0.1.1"/>
	</criteria>
	<!-- eed8891c855fdc5625db820413b29d27 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2887</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Reader and Acrobat 9.x before 9.4 on Linux allow attackers to gain privileges via unknown vectors.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2889</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted font, a different vulnerability than CVE-2010-3626.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2890</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2891</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2891" source="CVE"/>
	<description>
	Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.
	</description>
 </metadata>
<!-- f9c637f692a90b1e2ed81b9775e690c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065423" comment="libsmi-devel less than 0.4.5-1.91.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065424" comment="libsmi less than 0.4.5-1.91.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2935</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2935" source="CVE"/>
	<description>
	simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."
	</description>
 </metadata>
<!-- a8ee0d4865546d7ed0f2ac2582580694 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063766" comment="OpenOffice_org-draw less than 3.0.0.9-1.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063767" comment="OpenOffice_org-impress-devel less than 3.0.0.9-1.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063768" comment="OpenOffice_org-impress-l10n-prebuilt less than 3.0.0.9-1.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063769" comment="OpenOffice_org-impress less than 3.0.0.9-1.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063770" comment="OpenOffice_org-libs-gui-devel less than 3.0.0.9-1.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063771" comment="OpenOffice_org-libs-gui-l10n-prebuilt less than 3.0.0.9-1.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063772" comment="OpenOffice_org-libs-gui less than 3.0.0.9-1.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2936</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2936" source="CVE"/>
	<description>
	Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- a8ee0d4865546d7ed0f2ac2582580694 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063766" comment="OpenOffice_org-draw less than 3.0.0.9-1.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063767" comment="OpenOffice_org-impress-devel less than 3.0.0.9-1.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063768" comment="OpenOffice_org-impress-l10n-prebuilt less than 3.0.0.9-1.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063769" comment="OpenOffice_org-impress less than 3.0.0.9-1.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063770" comment="OpenOffice_org-libs-gui-devel less than 3.0.0.9-1.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063771" comment="OpenOffice_org-libs-gui-l10n-prebuilt less than 3.0.0.9-1.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063772" comment="OpenOffice_org-libs-gui less than 3.0.0.9-1.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2939</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2939" source="CVE"/>
	<description>
	Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime.  NOTE: some sources refer to this as a use-after-free issue.
	</description>
 </metadata>
<!-- 575af9c35e34cbcdab51c9d3fc19c27c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064321" comment="libopenssl-devel less than 0.9.8h-28.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064322" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064323" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064324" comment="libopenssl0_9_8 less than 0.9.8h-28.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064325" comment="openssl-doc less than 0.9.8h-28.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064326" comment="openssl less than 0.9.8h-28.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2941</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941" source="CVE"/>
	<description>
	ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request.
	</description>
 </metadata>
<!-- b9517c6deeb9b6fb02cdb512c1c8745c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064805" comment="cups-client less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064806" comment="cups-devel less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064807" comment="cups-libs-32bit less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064808" comment="cups-libs-64bit less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064809" comment="cups-libs less than 1.3.9-7.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064810" comment="cups less than 1.3.9-7.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2942</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2942" source="CVE"/>
	<description>
	The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
	</description>
 </metadata>
<!-- 56b43ecc0d4c24671a493b072ddc0db8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064139" comment="kernel-debug-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064140" comment="kernel-debug-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064141" comment="kernel-debug less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064142" comment="kernel-default-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064143" comment="kernel-default-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064144" comment="kernel-default less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064145" comment="kernel-docs less than 2.6.3-3.13.122"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064146" comment="kernel-kdump less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064147" comment="kernel-pae-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064148" comment="kernel-pae-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064149" comment="kernel-pae less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064150" comment="kernel-ppc64-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064151" comment="kernel-ppc64-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064152" comment="kernel-ppc64 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064153" comment="kernel-ps3 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064154" comment="kernel-source less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064155" comment="kernel-syms less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064156" comment="kernel-trace-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064157" comment="kernel-trace-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064158" comment="kernel-trace less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064159" comment="kernel-vanilla less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064160" comment="kernel-xen-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064161" comment="kernel-xen-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064162" comment="kernel-xen less than 2.6.27.54-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2946</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2946" source="CVE"/>
	<description>
	fs/jfs/xattr.c in the Linux kernel before 2.6.35.2 does not properly handle a certain legacy format for storage of extended attributes, which might allow local users by bypass intended xattr namespace restrictions via an "os2." substring at the beginning of a name.
	</description>
 </metadata>
<!-- 56b43ecc0d4c24671a493b072ddc0db8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064139" comment="kernel-debug-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064140" comment="kernel-debug-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064141" comment="kernel-debug less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064142" comment="kernel-default-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064143" comment="kernel-default-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064144" comment="kernel-default less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064145" comment="kernel-docs less than 2.6.3-3.13.122"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064146" comment="kernel-kdump less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064147" comment="kernel-pae-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064148" comment="kernel-pae-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064149" comment="kernel-pae less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064150" comment="kernel-ppc64-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064151" comment="kernel-ppc64-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064152" comment="kernel-ppc64 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064153" comment="kernel-ps3 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064154" comment="kernel-source less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064155" comment="kernel-syms less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064156" comment="kernel-trace-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064157" comment="kernel-trace-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064158" comment="kernel-trace less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064159" comment="kernel-vanilla less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064160" comment="kernel-xen-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064161" comment="kernel-xen-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064162" comment="kernel-xen less than 2.6.27.54-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2947</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2947" source="CVE"/>
	<description>
	Heap-based buffer overflow in the HX_split function in string.c in libHX before 3.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a string that is inconsistent with the expected number of fields.
	</description>
 </metadata>
<!-- 63d7343b4035756e43755bc987f77ff4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063462" comment="libHX13-32bit less than 1.23-3.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063463" comment="libHX13-64bit less than 1.23-3.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063464" comment="libHX13 less than 1.23-3.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2948</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2948" source="CVE"/>
	<description>
	Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering (ORF) record in a BGP ROUTE-REFRESH (RR) message.
	</description>
 </metadata>
<!-- 6463c69c301e0624506afed76827648f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064518" comment="quagga-devel less than 0.99.17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064519" comment="quagga less than 0.99.17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2949</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2949" source="CVE"/>
	<description>
	bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unknown AS type in an AS path attribute in a BGP UPDATE message.
	</description>
 </metadata>
<!-- 6463c69c301e0624506afed76827648f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064518" comment="quagga-devel less than 0.99.17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064519" comment="quagga less than 0.99.17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2954</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954" source="CVE"/>
	<description>
	The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.
	</description>
 </metadata>
<!-- 56b43ecc0d4c24671a493b072ddc0db8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064139" comment="kernel-debug-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064140" comment="kernel-debug-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064141" comment="kernel-debug less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064142" comment="kernel-default-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064143" comment="kernel-default-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064144" comment="kernel-default less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064145" comment="kernel-docs less than 2.6.3-3.13.122"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064146" comment="kernel-kdump less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064147" comment="kernel-pae-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064148" comment="kernel-pae-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064149" comment="kernel-pae less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064150" comment="kernel-ppc64-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064151" comment="kernel-ppc64-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064152" comment="kernel-ppc64 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064153" comment="kernel-ps3 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064154" comment="kernel-source less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064155" comment="kernel-syms less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064156" comment="kernel-trace-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064157" comment="kernel-trace-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064158" comment="kernel-trace less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064159" comment="kernel-vanilla less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064160" comment="kernel-xen-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064161" comment="kernel-xen-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064162" comment="kernel-xen less than 2.6.27.54-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2955</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955" source="CVE"/>
	<description>
	The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.
	</description>
 </metadata>
<!-- 56b43ecc0d4c24671a493b072ddc0db8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064139" comment="kernel-debug-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064140" comment="kernel-debug-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064141" comment="kernel-debug less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064142" comment="kernel-default-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064143" comment="kernel-default-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064144" comment="kernel-default less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064145" comment="kernel-docs less than 2.6.3-3.13.122"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064146" comment="kernel-kdump less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064147" comment="kernel-pae-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064148" comment="kernel-pae-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064149" comment="kernel-pae less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064150" comment="kernel-ppc64-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064151" comment="kernel-ppc64-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064152" comment="kernel-ppc64 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064153" comment="kernel-ps3 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064154" comment="kernel-source less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064155" comment="kernel-syms less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064156" comment="kernel-trace-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064157" comment="kernel-trace-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064158" comment="kernel-trace less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064159" comment="kernel-vanilla less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064160" comment="kernel-xen-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064161" comment="kernel-xen-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064162" comment="kernel-xen less than 2.6.27.54-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2959</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2959" source="CVE"/>
	<description>
	Integer overflow in net/can/bcm.c in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows attackers to execute arbitrary code or cause a denial of service (system crash) via crafted CAN traffic.
	</description>
 </metadata>
<!-- 57d489ee378a454db58bfa4122a6f0f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063045" comment="kernel-debug-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063046" comment="kernel-debug-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063047" comment="kernel-debug less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063048" comment="kernel-default-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063049" comment="kernel-default-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063050" comment="kernel-default less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063051" comment="kernel-docs less than 2.6.3-3.13.116"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063052" comment="kernel-kdump less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063053" comment="kernel-pae-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063054" comment="kernel-pae-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063055" comment="kernel-pae less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063056" comment="kernel-ppc64-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063057" comment="kernel-ppc64-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063058" comment="kernel-ppc64 less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063059" comment="kernel-ps3 less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063060" comment="kernel-source less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063061" comment="kernel-syms less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063062" comment="kernel-trace-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063063" comment="kernel-trace-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063064" comment="kernel-trace less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063065" comment="kernel-vanilla less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063066" comment="kernel-xen-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063067" comment="kernel-xen-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063068" comment="kernel-xen less than 2.6.27.48-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2963</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2963" source="CVE"/>
	<description>
	drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L) implementation in the Linux kernel before 2.6.36 on 64-bit platforms does not validate the destination of a memory copy operation, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via a VIDIOCSTUNER ioctl call on a /dev/video device, followed by a VIDIOCSMICROCODE ioctl call on this device.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2992</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2992" source="CVE"/>
	<description>
	packet-gsm_a_rr.c in the GSM A RR dissector in Wireshark 1.2.2 through 1.2.9 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference.
	</description>
 </metadata>
<!-- c6154f4e14e9cb7679828da0ff02362d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065421" comment="wireshark-devel less than 1.4.2-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065422" comment="wireshark less than 1.4.2-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2993</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2993" source="CVE"/>
	<description>
	The IPMI dissector in Wireshark 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- c6154f4e14e9cb7679828da0ff02362d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065421" comment="wireshark-devel less than 1.4.2-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065422" comment="wireshark less than 1.4.2-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2994</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2994" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ASN.1 BER dissector in Wireshark 0.10.13 through 1.0.14 and 1.2.0 through 1.2.9 has unknown impact and remote attack vectors.  NOTE: this issue exists because of a CVE-2010-2284 regression.
	</description>
 </metadata>
<!-- c6154f4e14e9cb7679828da0ff02362d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065421" comment="wireshark-devel less than 1.4.2-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065422" comment="wireshark less than 1.4.2-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2995</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-2995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2995" source="CVE"/>
	<description>
	The SigComp Universal Decompressor Virtual Machine (UDVM) in Wireshark 0.10.8 through 1.0.14 and 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to sigcomp-udvm.c and an off-by-one error, which triggers a buffer overflow, different vulnerabilities than CVE-2010-2287.
	</description>
 </metadata>
<!-- c6154f4e14e9cb7679828da0ff02362d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065421" comment="wireshark-devel less than 1.4.2-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065422" comment="wireshark less than 1.4.2-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3015</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3015" source="CVE"/>
	<description>
	Integer overflow in the ext4_ext_get_blocks function in fs/ext4/extents.c in the Linux kernel before 2.6.34 allows local users to cause a denial of service (BUG and system crash) via a write operation on the last block of a large file, followed by a sync operation.
	</description>
 </metadata>
<!-- 56b43ecc0d4c24671a493b072ddc0db8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064139" comment="kernel-debug-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064140" comment="kernel-debug-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064141" comment="kernel-debug less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064142" comment="kernel-default-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064143" comment="kernel-default-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064144" comment="kernel-default less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064145" comment="kernel-docs less than 2.6.3-3.13.122"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064146" comment="kernel-kdump less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064147" comment="kernel-pae-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064148" comment="kernel-pae-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064149" comment="kernel-pae less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064150" comment="kernel-ppc64-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064151" comment="kernel-ppc64-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064152" comment="kernel-ppc64 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064153" comment="kernel-ps3 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064154" comment="kernel-source less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064155" comment="kernel-syms less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064156" comment="kernel-trace-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064157" comment="kernel-trace-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064158" comment="kernel-trace less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064159" comment="kernel-vanilla less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064160" comment="kernel-xen-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064161" comment="kernel-xen-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064162" comment="kernel-xen less than 2.6.27.54-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3019</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3019" source="CVE"/>
	<description>
	Heap-based buffer overflow in Opera before 10.61 allows remote attackers to execute arbitrary code or cause a denial of service (application crash or hang) via vectors related to HTML5 canvas painting operations that occur during the application of transformations.
	</description>
 </metadata>
<!-- fc29e8522bfe42b16ef8fe80ce17ecf6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062048" comment="opera less than 10.61-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3020</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3020" source="CVE"/>
	<description>
	The news-feed preview feature in Opera before 10.61 does not properly remove scripts, which allows remote attackers to force subscriptions to arbitrary feeds via crafted content.
	</description>
 </metadata>
<!-- fc29e8522bfe42b16ef8fe80ce17ecf6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062048" comment="opera less than 10.61-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3021</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3021" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 10.61 allows remote attackers to cause a denial of service (CPU consumption and application hang) via an animated PNG image.
	</description>
 </metadata>
<!-- fc29e8522bfe42b16ef8fe80ce17ecf6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062048" comment="opera less than 10.61-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3053</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053" source="CVE"/>
	<description>
	bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.
	</description>
 </metadata>
<!-- 35cdbe0ae41b2eede7a95bdce718ab94 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063477" comment="freetype2-32bit less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063478" comment="freetype2-64bit less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063479" comment="freetype2-devel-32bit less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063480" comment="freetype2-devel-64bit less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063481" comment="freetype2-devel less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063482" comment="freetype2 less than 2.3.7-24.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3054</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054" source="CVE"/>
	<description>
	Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.
	</description>
 </metadata>
<!-- 35cdbe0ae41b2eede7a95bdce718ab94 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063477" comment="freetype2-32bit less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063478" comment="freetype2-64bit less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063479" comment="freetype2-devel-32bit less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063480" comment="freetype2-devel-64bit less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063481" comment="freetype2-devel less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063482" comment="freetype2 less than 2.3.7-24.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3062</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3062" source="CVE"/>
	<description>
	mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3063</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3063" source="CVE"/>
	<description>
	The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 through 5.3.2 does not properly calculate a buffer length, which allows context-dependent attackers to trigger a heap-based buffer overflow via crafted inputs that cause a negative length value to be used.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3064</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3064" source="CVE"/>
	<description>
	Stack-based buffer overflow in the php_mysqlnd_auth_write function in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) username or (2) database name argument to the (a) mysql_connect or (b) mysqli_connect function.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3065</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3065" source="CVE"/>
	<description>
	The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name.
	</description>
 </metadata>
<!-- 16eaf13af53b71cafb4dcecb6755fc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062323" comment="apache2-mod_php5 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062324" comment="php5-bcmath less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062325" comment="php5-bz2 less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062326" comment="php5-calendar less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062327" comment="php5-ctype less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062328" comment="php5-curl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062329" comment="php5-dba less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062330" comment="php5-dbase less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062367" comment="php5-devel less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062331" comment="php5-dom less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062332" comment="php5-exif less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062333" comment="php5-fastcgi less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062334" comment="php5-ftp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062335" comment="php5-gd less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062336" comment="php5-gettext less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062337" comment="php5-gmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062338" comment="php5-hash less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062339" comment="php5-iconv less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062368" comment="php5-imap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062340" comment="php5-json less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062341" comment="php5-ldap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062342" comment="php5-mbstring less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062343" comment="php5-mcrypt less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062344" comment="php5-mysql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062369" comment="php5-ncurses less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062345" comment="php5-odbc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062346" comment="php5-openssl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062347" comment="php5-pcntl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062348" comment="php5-pdo less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062349" comment="php5-pear less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062350" comment="php5-pgsql less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062370" comment="php5-posix less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062351" comment="php5-pspell less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062371" comment="php5-readline less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062352" comment="php5-shmop less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062353" comment="php5-snmp less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062354" comment="php5-soap less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062372" comment="php5-sockets less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062373" comment="php5-sqlite less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062355" comment="php5-suhosin less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062356" comment="php5-sysvmsg less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062357" comment="php5-sysvsem less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062358" comment="php5-sysvshm less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062374" comment="php5-tidy less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062359" comment="php5-tokenizer less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062360" comment="php5-wddx less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062361" comment="php5-xmlreader less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062362" comment="php5-xmlrpc less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062363" comment="php5-xmlwriter less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062364" comment="php5-xsl less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062365" comment="php5-zip less than 5.2.14-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062366" comment="php5-zlib less than 5.2.14-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3067</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067" source="CVE"/>
	<description>
	Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3069</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069" source="CVE"/>
	<description>
	Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
	</description>
 </metadata>
<!-- b86244f1a8e6a28a9cad78ef464ab652 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063088" comment="cifs-mount less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063089" comment="ldapsmb less than 1.34b-6.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063090" comment="libnetapi-devel less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063091" comment="libnetapi0 less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063092" comment="libsmbclient-devel less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063093" comment="libsmbclient0-32bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063094" comment="libsmbclient0-64bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063095" comment="libsmbclient0 less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063096" comment="libsmbsharemodes-devel less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063097" comment="libsmbsharemodes0 less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063098" comment="libtalloc-devel less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063099" comment="libtalloc1-32bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063100" comment="libtalloc1-64bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063101" comment="libtalloc1 less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063102" comment="libtdb-devel less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063103" comment="libtdb1-32bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063104" comment="libtdb1-64bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063105" comment="libtdb1 less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063106" comment="libwbclient-devel less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063107" comment="libwbclient0-32bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063108" comment="libwbclient0-64bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063109" comment="libwbclient0 less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063110" comment="samba-32bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063111" comment="samba-64bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063112" comment="samba-client-32bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063113" comment="samba-client-64bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063114" comment="samba-client less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063115" comment="samba-devel less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063116" comment="samba-krb-printing less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063117" comment="samba-vscan less than 0.3.6b-6.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063118" comment="samba-winbind-32bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063119" comment="samba-winbind-64bit less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063120" comment="samba-winbind less than 3.2.7-11.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063121" comment="samba less than 3.2.7-11.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3072</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3072" source="CVE"/>
	<description>
	The string-comparison functions in String.cci in Squid 3.x before 3.1.8 and 3.2.x before 3.2.0.2 allow remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.
	</description>
 </metadata>
<!-- f3c1e132352912583f94eb60c2703be5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063773" comment="squid3 less than 3.0.STABLE10-2.14.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3073</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3073" source="CVE"/>
	<description>
	SSL_Cipher.cpp in EncFS before 1.7.0 does not properly handle integer data sizes when constructing headers intended for randomization of initialization vectors, which makes it easier for local users to obtain sensitive information by defeating cryptographic protection mechanisms.
	</description>
 </metadata>
<!-- 7f3f14b55ba6b890b38c801f8c66c6b3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064853" comment="encfs less than 1.5.0-1.17.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3074</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3074" source="CVE"/>
	<description>
	SSL_Cipher.cpp in EncFS before 1.7.0 uses an improper combination of an AES cipher and a CBC cipher mode for encrypted filesystems, which allows local users to obtain sensitive information via a watermark attack.
	</description>
 </metadata>
<!-- 7f3f14b55ba6b890b38c801f8c66c6b3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064853" comment="encfs less than 1.5.0-1.17.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3075</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3075" source="CVE"/>
	<description>
	EncFS before 1.7.0 encrypts multiple blocks by means of the CFB cipher mode with the same initialization vector, which makes it easier for local users to obtain sensitive information via calculations involving recovery of XORed data, as demonstrated by an attack on encrypted data in which the last block contains only one byte.
	</description>
 </metadata>
<!-- 7f3f14b55ba6b890b38c801f8c66c6b3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064853" comment="encfs less than 1.5.0-1.17.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3078</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3078" source="CVE"/>
	<description>
	The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.
	</description>
 </metadata>
<!-- 56b43ecc0d4c24671a493b072ddc0db8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064139" comment="kernel-debug-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064140" comment="kernel-debug-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064141" comment="kernel-debug less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064142" comment="kernel-default-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064143" comment="kernel-default-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064144" comment="kernel-default less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064145" comment="kernel-docs less than 2.6.3-3.13.122"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064146" comment="kernel-kdump less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064147" comment="kernel-pae-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064148" comment="kernel-pae-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064149" comment="kernel-pae less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064150" comment="kernel-ppc64-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064151" comment="kernel-ppc64-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064152" comment="kernel-ppc64 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064153" comment="kernel-ps3 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064154" comment="kernel-source less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064155" comment="kernel-syms less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064156" comment="kernel-trace-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064157" comment="kernel-trace-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064158" comment="kernel-trace less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064159" comment="kernel-vanilla less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064160" comment="kernel-xen-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064161" comment="kernel-xen-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064162" comment="kernel-xen less than 2.6.27.54-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3080</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3080" source="CVE"/>
	<description>
	Double free vulnerability in the snd_seq_oss_open function in sound/core/seq/oss/seq_oss_init.c in the Linux kernel before 2.6.36-rc4 might allow local users to cause a denial of service or possibly have unspecified other impact via an unsuccessful attempt to open the /dev/sequencer device.
	</description>
 </metadata>
<!-- 56b43ecc0d4c24671a493b072ddc0db8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064139" comment="kernel-debug-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064140" comment="kernel-debug-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064141" comment="kernel-debug less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064142" comment="kernel-default-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064143" comment="kernel-default-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064144" comment="kernel-default less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064145" comment="kernel-docs less than 2.6.3-3.13.122"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064146" comment="kernel-kdump less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064147" comment="kernel-pae-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064148" comment="kernel-pae-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064149" comment="kernel-pae less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064150" comment="kernel-ppc64-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064151" comment="kernel-ppc64-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064152" comment="kernel-ppc64 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064153" comment="kernel-ps3 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064154" comment="kernel-source less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064155" comment="kernel-syms less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064156" comment="kernel-trace-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064157" comment="kernel-trace-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064158" comment="kernel-trace less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064159" comment="kernel-vanilla less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064160" comment="kernel-xen-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064161" comment="kernel-xen-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064162" comment="kernel-xen less than 2.6.27.54-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3081</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081" source="CVE"/>
	<description>
	The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
	</description>
 </metadata>
<!-- 57d489ee378a454db58bfa4122a6f0f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063045" comment="kernel-debug-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063046" comment="kernel-debug-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063047" comment="kernel-debug less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063048" comment="kernel-default-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063049" comment="kernel-default-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063050" comment="kernel-default less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063051" comment="kernel-docs less than 2.6.3-3.13.116"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063052" comment="kernel-kdump less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063053" comment="kernel-pae-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063054" comment="kernel-pae-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063055" comment="kernel-pae less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063056" comment="kernel-ppc64-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063057" comment="kernel-ppc64-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063058" comment="kernel-ppc64 less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063059" comment="kernel-ps3 less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063060" comment="kernel-source less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063061" comment="kernel-syms less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063062" comment="kernel-trace-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063063" comment="kernel-trace-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063064" comment="kernel-trace less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063065" comment="kernel-vanilla less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063066" comment="kernel-xen-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063067" comment="kernel-xen-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063068" comment="kernel-xen less than 2.6.27.48-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3131</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3131" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 on Windows XP allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .htm, .html, .jtx, .mfp, or .eml file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3166</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3166" source="CVE"/>
	<description>
	Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3167</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3167" source="CVE"/>
	<description>
	The nsTreeContentView function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle node removal in XUL trees, which allows remote attackers to execute arbitrary code via vectors involving access to deleted memory, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3168</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3168" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict the role of property changes in triggering XUL tree removal, which allows remote attackers to cause a denial of service (deleted memory access and application crash) or possibly execute arbitrary code by setting unspecified properties.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3169</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3169" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063401" comment="MozillaThunderbird-devel less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063402" comment="MozillaThunderbird-translations-common less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063403" comment="MozillaThunderbird-translations-other less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063404" comment="MozillaThunderbird less than 3.0.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063424" comment="enigmail less than 1.0.1-5.2.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3170</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 32e930a50eca8c752cb161077c686997 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063906" comment="libfreebl3-32bit less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064019" comment="libfreebl3-64bit less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063907" comment="libfreebl3 less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063908" comment="mozilla-nspr-32bit less than 4.8.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064020" comment="mozilla-nspr-64bit less than 4.8.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063909" comment="mozilla-nspr-devel less than 4.8.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063910" comment="mozilla-nspr less than 4.8.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063911" comment="mozilla-nss-32bit less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064021" comment="mozilla-nss-64bit less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063912" comment="mozilla-nss-devel less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063913" comment="mozilla-nss-tools less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063914" comment="mozilla-nss less than 3.12.8-1.1.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064163" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064164" comment="MozillaFirefox-translations-common less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064165" comment="MozillaFirefox-translations-other less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064166" comment="MozillaFirefox less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064167" comment="mozilla-js192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064168" comment="mozilla-js192 less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064169" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064170" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064171" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064172" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064173" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064174" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064175" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064176" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064177" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064178" comment="mozilla-xulrunner192 less than 1.9.2.12-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3173</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3173" source="CVE"/>
	<description>
	The SSL implementation in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly set the minimum key length for Diffie-Hellman Ephemeral (DHE) mode, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
	</description>
 </metadata>
<!-- 32e930a50eca8c752cb161077c686997 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063906" comment="libfreebl3-32bit less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064019" comment="libfreebl3-64bit less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063907" comment="libfreebl3 less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063908" comment="mozilla-nspr-32bit less than 4.8.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064020" comment="mozilla-nspr-64bit less than 4.8.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063909" comment="mozilla-nspr-devel less than 4.8.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063910" comment="mozilla-nspr less than 4.8.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063911" comment="mozilla-nss-32bit less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064021" comment="mozilla-nss-64bit less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063912" comment="mozilla-nss-devel less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063913" comment="mozilla-nss-tools less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063914" comment="mozilla-nss less than 3.12.8-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3174</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3174" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.14, Thunderbird before 3.0.9, and SeaMonkey before 2.0.9 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064163" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064164" comment="MozillaFirefox-translations-common less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064165" comment="MozillaFirefox-translations-other less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064166" comment="MozillaFirefox less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064167" comment="mozilla-js192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064168" comment="mozilla-js192 less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064169" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064170" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064171" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064172" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064173" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064174" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064175" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064176" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064177" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064178" comment="mozilla-xulrunner192 less than 1.9.2.12-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3175</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3175" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.11 and Thunderbird 3.1.x before 3.1.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064163" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064164" comment="MozillaFirefox-translations-common less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064165" comment="MozillaFirefox-translations-other less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064166" comment="MozillaFirefox less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064167" comment="mozilla-js192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064168" comment="mozilla-js192 less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064169" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064170" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064171" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064172" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064173" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064174" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064175" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064176" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064177" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064178" comment="mozilla-xulrunner192 less than 1.9.2.12-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3176</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3176" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064163" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064164" comment="MozillaFirefox-translations-common less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064165" comment="MozillaFirefox-translations-other less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064166" comment="MozillaFirefox less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064167" comment="mozilla-js192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064168" comment="mozilla-js192 less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064169" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064170" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064171" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064172" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064173" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064174" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064175" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064176" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064177" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064178" comment="mozilla-xulrunner192 less than 1.9.2.12-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3177</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3177" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the Gopher parser in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, and SeaMonkey before 2.0.9, allow remote attackers to inject arbitrary web script or HTML via a crafted name of a (1) file or (2) directory on a Gopher server.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064163" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064164" comment="MozillaFirefox-translations-common less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064165" comment="MozillaFirefox-translations-other less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064166" comment="MozillaFirefox less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064167" comment="mozilla-js192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064168" comment="mozilla-js192 less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064169" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064170" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064171" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064172" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064173" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064174" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064175" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064176" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064177" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064178" comment="mozilla-xulrunner192 less than 1.9.2.12-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3178</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3178" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 do not properly handle certain modal calls made by javascript: URLs in circumstances related to opening a new window and performing cross-domain navigation, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064163" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064164" comment="MozillaFirefox-translations-common less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064165" comment="MozillaFirefox-translations-other less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064166" comment="MozillaFirefox less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064167" comment="mozilla-js192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064168" comment="mozilla-js192 less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064169" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064170" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064171" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064172" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064173" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064174" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064175" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064176" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064177" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064178" comment="mozilla-xulrunner192 less than 1.9.2.12-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3179</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3179" source="CVE"/>
	<description>
	Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a long argument to the document.write method.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064163" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064164" comment="MozillaFirefox-translations-common less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064165" comment="MozillaFirefox-translations-other less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064166" comment="MozillaFirefox less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064167" comment="mozilla-js192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064168" comment="mozilla-js192 less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064169" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064170" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064171" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064172" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064173" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064174" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064175" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064176" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064177" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064178" comment="mozilla-xulrunner192 less than 1.9.2.12-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3180</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3180" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsBarProp function in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code by accessing the locationbar property of a closed window.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064163" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064164" comment="MozillaFirefox-translations-common less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064165" comment="MozillaFirefox-translations-other less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064166" comment="MozillaFirefox less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064167" comment="mozilla-js192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064168" comment="mozilla-js192 less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064169" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064170" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064171" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064172" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064173" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064174" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064175" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064176" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064177" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064178" comment="mozilla-xulrunner192 less than 1.9.2.12-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3182</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3182" source="CVE"/>
	<description>
	A certain application-launch script in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 on Linux places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064163" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064164" comment="MozillaFirefox-translations-common less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064165" comment="MozillaFirefox-translations-other less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064166" comment="MozillaFirefox less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064167" comment="mozilla-js192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064168" comment="mozilla-js192 less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064169" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064170" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064171" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064172" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064173" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064174" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064175" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064176" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064177" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064178" comment="mozilla-xulrunner192 less than 1.9.2.12-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3183</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3183" source="CVE"/>
	<description>
	The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lack arguments, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference and application crash) via vectors involving a "dangling pointer" and the JS_ValueToId function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064014" comment="seamonkey-dom-inspector less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064015" comment="seamonkey-irc less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064016" comment="seamonkey-venkman less than 2.0.9-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064017" comment="seamonkey less than 2.0.9-0.1.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064163" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064164" comment="MozillaFirefox-translations-common less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064165" comment="MozillaFirefox-translations-other less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064166" comment="MozillaFirefox less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064167" comment="mozilla-js192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064168" comment="mozilla-js192 less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064169" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064170" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064171" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064172" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064173" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064174" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064175" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064176" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064177" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064178" comment="mozilla-xulrunner192 less than 1.9.2.12-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063901" comment="MozillaThunderbird-devel less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063902" comment="MozillaThunderbird-translations-common less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063903" comment="MozillaThunderbird-translations-other less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063904" comment="MozillaThunderbird less than 3.0.9-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064018" comment="enigmail less than 1.0.1-5.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3296</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3296" source="CVE"/>
	<description>
	The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.
	</description>
 </metadata>
<!-- 56b43ecc0d4c24671a493b072ddc0db8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064139" comment="kernel-debug-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064140" comment="kernel-debug-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064141" comment="kernel-debug less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064142" comment="kernel-default-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064143" comment="kernel-default-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064144" comment="kernel-default less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064145" comment="kernel-docs less than 2.6.3-3.13.122"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064146" comment="kernel-kdump less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064147" comment="kernel-pae-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064148" comment="kernel-pae-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064149" comment="kernel-pae less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064150" comment="kernel-ppc64-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064151" comment="kernel-ppc64-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064152" comment="kernel-ppc64 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064153" comment="kernel-ps3 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064154" comment="kernel-source less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064155" comment="kernel-syms less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064156" comment="kernel-trace-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064157" comment="kernel-trace-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064158" comment="kernel-trace less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064159" comment="kernel-vanilla less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064160" comment="kernel-xen-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064161" comment="kernel-xen-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064162" comment="kernel-xen less than 2.6.27.54-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3297</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297" source="CVE"/>
	<description>
	The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.
	</description>
 </metadata>
<!-- 56b43ecc0d4c24671a493b072ddc0db8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064139" comment="kernel-debug-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064140" comment="kernel-debug-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064141" comment="kernel-debug less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064142" comment="kernel-default-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064143" comment="kernel-default-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064144" comment="kernel-default less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064145" comment="kernel-docs less than 2.6.3-3.13.122"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064146" comment="kernel-kdump less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064147" comment="kernel-pae-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064148" comment="kernel-pae-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064149" comment="kernel-pae less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064150" comment="kernel-ppc64-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064151" comment="kernel-ppc64-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064152" comment="kernel-ppc64 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064153" comment="kernel-ps3 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064154" comment="kernel-source less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064155" comment="kernel-syms less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064156" comment="kernel-trace-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064157" comment="kernel-trace-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064158" comment="kernel-trace less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064159" comment="kernel-vanilla less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064160" comment="kernel-xen-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064161" comment="kernel-xen-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064162" comment="kernel-xen less than 2.6.27.54-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3301</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3301" source="CVE"/>
	<description>
	The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register.  NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
	</description>
 </metadata>
<!-- 57d489ee378a454db58bfa4122a6f0f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063045" comment="kernel-debug-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063046" comment="kernel-debug-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063047" comment="kernel-debug less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063048" comment="kernel-default-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063049" comment="kernel-default-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063050" comment="kernel-default less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063051" comment="kernel-docs less than 2.6.3-3.13.116"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063052" comment="kernel-kdump less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063053" comment="kernel-pae-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063054" comment="kernel-pae-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063055" comment="kernel-pae less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063056" comment="kernel-ppc64-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063057" comment="kernel-ppc64-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063058" comment="kernel-ppc64 less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063059" comment="kernel-ps3 less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063060" comment="kernel-source less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063061" comment="kernel-syms less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063062" comment="kernel-trace-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063063" comment="kernel-trace-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063064" comment="kernel-trace less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063065" comment="kernel-vanilla less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063066" comment="kernel-xen-base less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063067" comment="kernel-xen-extra less than 2.6.27.48-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063068" comment="kernel-xen less than 2.6.27.48-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3310</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310" source="CVE"/>
	<description>
	Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.
	</description>
 </metadata>
<!-- 56b43ecc0d4c24671a493b072ddc0db8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064139" comment="kernel-debug-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064140" comment="kernel-debug-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064141" comment="kernel-debug less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064142" comment="kernel-default-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064143" comment="kernel-default-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064144" comment="kernel-default less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064145" comment="kernel-docs less than 2.6.3-3.13.122"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064146" comment="kernel-kdump less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064147" comment="kernel-pae-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064148" comment="kernel-pae-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064149" comment="kernel-pae less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064150" comment="kernel-ppc64-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064151" comment="kernel-ppc64-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064152" comment="kernel-ppc64 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064153" comment="kernel-ps3 less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064154" comment="kernel-source less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064155" comment="kernel-syms less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064156" comment="kernel-trace-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064157" comment="kernel-trace-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064158" comment="kernel-trace less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064159" comment="kernel-vanilla less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064160" comment="kernel-xen-base less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064161" comment="kernel-xen-extra less than 2.6.27.54-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064162" comment="kernel-xen less than 2.6.27.54-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3311</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311" source="CVE"/>
	<description>
	Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.
	</description>
 </metadata>
<!-- 35cdbe0ae41b2eede7a95bdce718ab94 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063477" comment="freetype2-32bit less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063478" comment="freetype2-64bit less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063479" comment="freetype2-devel-32bit less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063480" comment="freetype2-devel-64bit less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063481" comment="freetype2-devel less than 2.3.7-24.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063482" comment="freetype2 less than 2.3.7-24.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3315</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3315" source="CVE"/>
	<description>
	authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands.
	</description>
 </metadata>
<!-- 29aebe3c7ff3602bb896c4ba979c8d92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064984" comment="subversion-devel less than 1.5.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064985" comment="subversion-perl less than 1.5.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064986" comment="subversion-python less than 1.5.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064987" comment="subversion-server less than 1.5.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064988" comment="subversion-tools less than 1.5.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064989" comment="subversion less than 1.5.7-0.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3433</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3433" source="CVE"/>
	<description>
	The PL/perl and PL/Tcl implementations in PostgreSQL 7.4 before 7.4.30, 8.0 before 8.0.26, 8.1 before 8.1.22, 8.2 before 8.2.18, 8.3 before 8.3.12, 8.4 before 8.4.5, and 9.0 before 9.0.1 do not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, as demonstrated by (1) redefining standard functions or (2) redefining operators, a different vulnerability than CVE-2010-1168, CVE-2010-1169, CVE-2010-1170, and CVE-2010-1447.
	</description>
 </metadata>
<!-- 2fb000c38a14a96b78e19a27a88b66f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064022" comment="postgresql-contrib less than 8.3.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064023" comment="postgresql-devel less than 8.3.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064024" comment="postgresql-docs less than 8.3.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064025" comment="postgresql-libs-32bit less than 8.3.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064026" comment="postgresql-libs-64bit less than 8.3.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064027" comment="postgresql-libs less than 8.3.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064028" comment="postgresql-plperl less than 8.3.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064029" comment="postgresql-plpython less than 8.3.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064030" comment="postgresql-pltcl less than 8.3.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064031" comment="postgresql-server less than 8.3.12-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064032" comment="postgresql less than 8.3.12-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3434</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3434" source="CVE"/>
	<description>
	Buffer overflow in the find_stream_bounds function in pdf.c in libclamav in ClamAV before 0.96.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 77b995e1c29f7cb026d09f0aa06ad2b6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064073" comment="clamav-db less than 0.96.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064074" comment="clamav less than 0.96.3-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3437</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3437" source="CVE"/>
	<description>
	Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3442</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3442" source="CVE"/>
	<description>
	Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3445</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3445" source="CVE"/>
	<description>
	Stack consumption vulnerability in the dissect_ber_unknown function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.4.x before 1.4.1 and 1.2.x before 1.2.12 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a long string in an unknown ASN.1/BER encoded packet, as demonstrated using SNMP.
	</description>
 </metadata>
<!-- c6154f4e14e9cb7679828da0ff02362d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065421" comment="wireshark-devel less than 1.4.2-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065422" comment="wireshark less than 1.4.2-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3541</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3541" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3548</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3548" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Naming and Directory Interface (JNDI) component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to determine internal IP addresses or "otherwise-protected internal network names."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3549</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3549" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is an HTTP request splitting vulnerability involving the handling of the chunked transfer encoding method by the HttpURLConnection class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3550</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3550" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3551</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3551" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3552</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3552" source="CVE"/>
	<description>
	Unspecified vulnerability in the New Java Plug-in component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3553</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3553" source="CVE"/>
	<description>
	Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to unsafe reflection involving the UIDefault.ProxyLazyValue class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3554</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3554" source="CVE"/>
	<description>
	Unspecified vulnerability in the CORBA component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to "permissions granted to certain system objects."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3555</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3555" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that the ActiveX Plugin does not properly initialize an object field that is used as a window handle, which allows attackers to execute arbitrary code.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3556</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3556" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3557</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3557" source="CVE"/>
	<description>
	Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to the modification of "behavior and state of certain JDK classes" and "mutable static."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3558</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3558" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3559</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3559" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this involves an incorrect sign extension in the HeadspaceSoundbank.nGetName function, which allows attackers to execute arbitrary code via a crafted BANK record that leads to a buffer overflow.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3560</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3560" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3561</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3561" source="CVE"/>
	<description>
	Unspecified vulnerability in the CORBA component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this involves the use of the privileged accept method in the ServerSocket class, which does not limit which hosts can connect and allows remote attackers to bypass intended network access restrictions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3562</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3562" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a double free vulnerability in IndexColorModel that allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3563</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3563" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to "how Web Start retrieves security policies," BasicServiceImpl, and forged policies that bypass sandbox restrictions.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3564</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3564" source="CVE"/>
	<description>
	Unspecified vulnerability in the Oracle Communications Messaging Server (Sun Java System Messaging Server) component in Oracle Sun Products Suite 7.0 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Webmail.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that the Kerberos implementation does not properly check AP-REQ requests, which allows attackers to cause a denial of service in the JVM.  NOTE: CVE has not investigated the apparent discrepancy between the two vendors regarding the consequences of this issue.
	</description>
 </metadata>
<!-- 0fe727890fe34afac53580c5a6ff8598 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3565</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3565" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that triggers memory corruption via large values in a subsample of a JPEG image, related to JPEGImageWriter.writeImage in the imageio API.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3566</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3566" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update and 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that leads to a buffer overflow via a crafted devs (device information) tag structure in a color profile.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3567</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3567" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to a calculation error in right-to-left text character counts for the ICU OpenType font rendering implementation, which triggers an out-of-bounds memory access.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3568</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3568" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a race condition related to deserialization.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3569</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3569" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to execute arbitrary code by causing the defaultReadObject method in the Serialization API to set a volatile field multiple times.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3570</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3570" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment Toolkit component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3571</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3571" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the color profile parser that allows remote attackers to execute arbitrary code via a crafted Tag structure in a color profile.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3572</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3572" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3573</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3573" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3574</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3574" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064425" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064426" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064427" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064428" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064429" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064430" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.1.3"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3609</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3609" source="CVE"/>
	<description>
	The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 6fb7a83d5fcc87c581df7d7143257642 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064542" comment="openslp-32bit less than 1.2.0-168.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064543" comment="openslp-64bit less than 1.2.0-168.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064544" comment="openslp-devel less than 1.2.0-168.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064545" comment="openslp-server less than 1.2.0-168.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064546" comment="openslp less than 1.2.0-168.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3619</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3620</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3629.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3621</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3622</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3623</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3623" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3624</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3624" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allows attackers to execute arbitrary code via a crafted image.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3625</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified vectors, related to a "prefix protocol handler vulnerability."
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3626</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted font, a different vulnerability than CVE-2010-2889.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3627</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3628</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3629</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3620.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3630</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3631</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3631" source="CVE"/>
	<description>
	Array index error in Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3632</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, and CVE-2010-3658.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3636</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3636" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, does not properly handle unspecified encodings during the parsing of a cross-domain policy file, which allows remote web servers to bypass intended access restrictions via unknown vectors.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3637</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3637" source="CVE"/>
	<description>
	An unspecified ActiveX control in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 (Flash10h.ocx) on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted FLV video.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3638</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3638" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Mac OS X, when Safari is used, allows attackers to obtain sensitive information via unknown vectors.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3639</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3639" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3640</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3640" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3641</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3641" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3642</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3642" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3643</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3643" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3644</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3644" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3645</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3645" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3646</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3646" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3647</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3647" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3648</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3648" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3649</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3649" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3650</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3650" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3651</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3651" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3652</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3652" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3650.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3654</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 118393cb5d6c5eb8b87532b448eb409e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
	</criteria>
	<!-- 82eec958a08d3fc6d0b6d3f26f80f91b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064857" comment="acroread-cmaps less than 9.4.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064858" comment="acroread-fonts-ja less than 9.4.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064859" comment="acroread-fonts-ko less than 9.4.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064860" comment="acroread-fonts-zh_CN less than 9.4.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064861" comment="acroread-fonts-zh_TW less than 9.4.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064862" comment="acroread less than 9.4.1-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3656</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service via unknown vectors, a different vulnerability than CVE-2010-3657.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3657</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service via unknown vectors, a different vulnerability than CVE-2010-3656.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3658</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, and CVE-2010-3632.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063363" comment="acroread-cmaps less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063364" comment="acroread-fonts-ja less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063365" comment="acroread-fonts-ko less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063366" comment="acroread-fonts-zh_CN less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063367" comment="acroread-fonts-zh_TW less than 9.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3677</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3677" source="CVE"/>
	<description>
	Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.
	</description>
 </metadata>
<!-- dc5c431e781c685bb610b6d2a2ec8ee2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063568" comment="libmysqlclient-devel less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063569" comment="libmysqlclient15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063570" comment="libmysqlclient15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063571" comment="libmysqlclient15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063572" comment="libmysqlclient_r15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063573" comment="libmysqlclient_r15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063574" comment="libmysqlclient_r15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063575" comment="mysql-Max less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063576" comment="mysql-bench less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063577" comment="mysql-client less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063578" comment="mysql-debug less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063579" comment="mysql-test less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063580" comment="mysql-tools less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063581" comment="mysql less than 5.0.67-12.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3678</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3678" source="CVE"/>
	<description>
	Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier.
	</description>
 </metadata>
<!-- dc5c431e781c685bb610b6d2a2ec8ee2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063568" comment="libmysqlclient-devel less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063569" comment="libmysqlclient15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063570" comment="libmysqlclient15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063571" comment="libmysqlclient15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063572" comment="libmysqlclient_r15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063573" comment="libmysqlclient_r15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063574" comment="libmysqlclient_r15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063575" comment="mysql-Max less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063576" comment="mysql-bench less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063577" comment="mysql-client less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063578" comment="mysql-debug less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063579" comment="mysql-test less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063580" comment="mysql-tools less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063581" comment="mysql less than 5.0.67-12.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3681</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3681" source="CVE"/>
	<description>
	Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing "alternate reads from two indexes on a table," which triggers an assertion failure.
	</description>
 </metadata>
<!-- dc5c431e781c685bb610b6d2a2ec8ee2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063568" comment="libmysqlclient-devel less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063569" comment="libmysqlclient15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063570" comment="libmysqlclient15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063571" comment="libmysqlclient15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063572" comment="libmysqlclient_r15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063573" comment="libmysqlclient_r15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063574" comment="libmysqlclient_r15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063575" comment="mysql-Max less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063576" comment="mysql-bench less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063577" comment="mysql-client less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063578" comment="mysql-debug less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063579" comment="mysql-test less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063580" comment="mysql-tools less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063581" comment="mysql less than 5.0.67-12.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3682</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3682" source="CVE"/>
	<description>
	Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted "SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.
	</description>
 </metadata>
<!-- dc5c431e781c685bb610b6d2a2ec8ee2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063568" comment="libmysqlclient-devel less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063569" comment="libmysqlclient15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063570" comment="libmysqlclient15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063571" comment="libmysqlclient15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063572" comment="libmysqlclient_r15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063573" comment="libmysqlclient_r15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063574" comment="libmysqlclient_r15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063575" comment="mysql-Max less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063576" comment="mysql-bench less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063577" comment="mysql-client less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063578" comment="mysql-debug less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063579" comment="mysql-test less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063580" comment="mysql-tools less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063581" comment="mysql less than 5.0.67-12.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3683</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3683" source="CVE"/>
	<description>
	Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request.
	</description>
 </metadata>
<!-- dc5c431e781c685bb610b6d2a2ec8ee2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063568" comment="libmysqlclient-devel less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063569" comment="libmysqlclient15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063570" comment="libmysqlclient15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063571" comment="libmysqlclient15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063572" comment="libmysqlclient_r15-32bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063573" comment="libmysqlclient_r15-64bit less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063574" comment="libmysqlclient_r15 less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063575" comment="mysql-Max less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063576" comment="mysql-bench less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063577" comment="mysql-client less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063578" comment="mysql-debug less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063579" comment="mysql-test less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063580" comment="mysql-tools less than 5.0.67-12.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063581" comment="mysql less than 5.0.67-12.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3702</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702" source="CVE"/>
	<description>
	The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 426ff3fa5e0c32989db614bbe6a3ca89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065319" comment="xpdf-tools less than 3.02-97.83.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065320" comment="xpdf less than 3.02-97.83.1"/>
		</criteria>
	</criteria>
	<!-- 8ff143c8851cd9d21fd1b8944f9d00a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064493" comment="libpoppler-devel less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064494" comment="libpoppler-doc less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064495" comment="libpoppler-glib-devel less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064496" comment="libpoppler-glib4 less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064497" comment="libpoppler-qt2 less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064498" comment="libpoppler-qt3-devel less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064499" comment="libpoppler-qt4-3 less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064500" comment="libpoppler-qt4-devel less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064501" comment="libpoppler4 less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064502" comment="poppler-tools less than 0.10.1-1.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3703</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703" source="CVE"/>
	<description>
	The PostScriptFunction::PostScriptFunction function in poppler/Function.cc in the PDF parser in poppler 0.8.7 and possibly other versions up to 0.15.1, and possibly other products, allows context-dependent attackers to cause a denial of service (crash) via a PDF file that triggers an uninitialized pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 426ff3fa5e0c32989db614bbe6a3ca89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065319" comment="xpdf-tools less than 3.02-97.83.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065320" comment="xpdf less than 3.02-97.83.1"/>
		</criteria>
	</criteria>
	<!-- 8ff143c8851cd9d21fd1b8944f9d00a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064493" comment="libpoppler-devel less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064494" comment="libpoppler-doc less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064495" comment="libpoppler-glib-devel less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064496" comment="libpoppler-glib4 less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064497" comment="libpoppler-qt2 less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064498" comment="libpoppler-qt3-devel less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064499" comment="libpoppler-qt4-3 less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064500" comment="libpoppler-qt4-devel less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064501" comment="libpoppler4 less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064502" comment="poppler-tools less than 0.10.1-1.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3704</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704" source="CVE"/>
	<description>
	The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 426ff3fa5e0c32989db614bbe6a3ca89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065319" comment="xpdf-tools less than 3.02-97.83.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065320" comment="xpdf less than 3.02-97.83.1"/>
		</criteria>
	</criteria>
	<!-- 8ff143c8851cd9d21fd1b8944f9d00a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064493" comment="libpoppler-devel less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064494" comment="libpoppler-doc less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064495" comment="libpoppler-glib-devel less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064496" comment="libpoppler-glib4 less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064497" comment="libpoppler-qt2 less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064498" comment="libpoppler-qt3-devel less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064499" comment="libpoppler-qt4-3 less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064500" comment="libpoppler-qt4-devel less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064501" comment="libpoppler4 less than 0.10.1-1.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064502" comment="poppler-tools less than 0.10.1-1.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3710</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3710" source="CVE"/>
	<description>
	Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string.
	</description>
 </metadata>
<!-- 8107cbeafc0794f40711a2548bab0d60 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062580" comment="php5-hash less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062583" comment="php5-json less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064714" comment="php5-readline less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062613" comment="php5-tidy less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064715" comment="php5-xmlwriter less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064716" comment="php5-zip less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3765</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3765" source="CVE"/>
	<description>
	Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03673ac1b3c574b9c9caadfdf8cdba6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064179" comment="seamonkey-dom-inspector less than 2.0.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064180" comment="seamonkey-irc less than 2.0.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064181" comment="seamonkey-venkman less than 2.0.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064182" comment="seamonkey less than 2.0.10-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 400c9eb6f9b1dc3382521accd699c8e1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064183" comment="MozillaThunderbird-devel less than 3.0.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064184" comment="MozillaThunderbird-translations-common less than 3.0.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064185" comment="MozillaThunderbird-translations-other less than 3.0.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064186" comment="MozillaThunderbird less than 3.0.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064187" comment="enigmail less than 1.0.1-6.5.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064163" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064164" comment="MozillaFirefox-translations-common less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064165" comment="MozillaFirefox-translations-other less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064166" comment="MozillaFirefox less than 3.6.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064167" comment="mozilla-js192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064168" comment="mozilla-js192 less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064169" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064170" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064171" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064172" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064173" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064174" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064175" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064176" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064177" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064178" comment="mozilla-xulrunner192 less than 1.9.2.12-0.1.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064131" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064132" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064133" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064134" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064135" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064136" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064137" comment="mozilla-xulrunner191 less than 1.9.1.15-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064138" comment="python-xpcom191 less than 1.9.1.15-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3766</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3766" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via vectors involving a change to an nsDOMAttribute node.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3767</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3767" source="CVE"/>
	<description>
	Integer overflow in the NewIdArray function in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via a JavaScript array with many elements.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3768</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3768" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 do not properly validate downloadable fonts before use within an operating system's font implementation, which allows remote attackers to execute arbitrary code via vectors related to @font-face Cascading Style Sheets (CSS) rules.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3769</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3769" source="CVE"/>
	<description>
	The line-breaking implementation in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 on Windows does not properly handle long strings, which allows remote attackers to execute arbitrary code via a crafted document.write call that triggers a buffer over-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3770</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3770" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the rendering engine in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allow remote attackers to inject arbitrary web script or HTML via (1) x-mac-arabic, (2) x-mac-farsi, or (3) x-mac-hebrew characters that may be converted to angle brackets during rendering.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3771</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3771" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly handle injection of an ISINDEX element into an about:blank page, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to redirection to a chrome: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3772</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3772" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly calculate index values for certain child content in a XUL tree, which allows remote attackers to execute arbitrary code via vectors involving a DIV element within a treechildren element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3773</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3773" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-0179.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3774</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3774" source="CVE"/>
	<description>
	The NS_SecurityCompareURIs function in netwerk/base/public/nsNetUtil.h in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly handle (1) about:neterror and (2) about:certerror pages, which allows remote attackers to spoof the location bar via a crafted web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3775</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3775" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly handle certain redirections involving data: URLs and Java LiveConnect scripts, which allows remote attackers to start processes, read arbitrary local files, and establish network connections via vectors involving a refresh value in the http-equiv attribute of a META element, which causes the wrong security principal to be used.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3776</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3776" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3777</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3777" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox 3.6.x before 3.6.13 and Thunderbird 3.1.x before 3.1.7 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3778</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3778" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox 3.5.x before 3.5.16, Thunderbird before 3.0.11, and SeaMonkey before 2.0.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065116" comment="MozillaThunderbird-devel less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065117" comment="MozillaThunderbird-translations-common less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065118" comment="MozillaThunderbird-translations-other less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065119" comment="MozillaThunderbird less than 3.0.11-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065120" comment="enigmail less than 1.0.1-6.6.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065250" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065251" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065252" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065253" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065254" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065255" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065256" comment="mozilla-xulrunner191 less than 1.9.1.16-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065257" comment="python-xpcom191 less than 1.9.1.16-0.1.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065258" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065259" comment="MozillaFirefox-translations-common less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065260" comment="MozillaFirefox-translations-other less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065261" comment="MozillaFirefox less than 3.6.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065262" comment="mozilla-js192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065263" comment="mozilla-js192 less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065264" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065265" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065266" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065267" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065268" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065269" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065270" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065271" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065272" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065273" comment="mozilla-xulrunner192 less than 1.9.2.13-0.1.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065121" comment="seamonkey-dom-inspector less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065122" comment="seamonkey-irc less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065123" comment="seamonkey-venkman less than 2.0.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065124" comment="seamonkey less than 2.0.11-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3847</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847" source="CVE"/>
	<description>
	elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.
	</description>
 </metadata>
<!-- 7f2cb38ab30086b2e83a460f9fab3881 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063995" comment="glibc-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063996" comment="glibc-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063997" comment="glibc-devel-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063998" comment="glibc-devel-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063999" comment="glibc-devel less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064000" comment="glibc-html less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064001" comment="glibc-i18ndata less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064002" comment="glibc-info less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064003" comment="glibc-locale-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064004" comment="glibc-locale-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064005" comment="glibc-locale less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064006" comment="glibc-obsolete less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064007" comment="glibc-profile-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064008" comment="glibc-profile-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064009" comment="glibc-profile less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064010" comment="glibc less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064011" comment="nscd less than 2.9-2.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3856</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856" source="CVE"/>
	<description>
	ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.
	</description>
 </metadata>
<!-- 7f2cb38ab30086b2e83a460f9fab3881 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063995" comment="glibc-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063996" comment="glibc-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063997" comment="glibc-devel-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063998" comment="glibc-devel-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063999" comment="glibc-devel less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064000" comment="glibc-html less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064001" comment="glibc-i18ndata less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064002" comment="glibc-info less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064003" comment="glibc-locale-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064004" comment="glibc-locale-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064005" comment="glibc-locale less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064006" comment="glibc-obsolete less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064007" comment="glibc-profile-32bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064008" comment="glibc-profile-64bit less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064009" comment="glibc-profile less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064010" comment="glibc less than 2.9-2.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064011" comment="nscd less than 2.9-2.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3860</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3860" source="CVE"/>
	<description>
	IcedTea 1.7.x before 1.7.6, 1.8.x before 1.8.3, and 1.9.x before 1.9.2, as based on OpenJDK 6, declares multiple sensitive variables as public, which allows remote attackers to obtain sensitive information including (1) user.name, (2) user.home, and (3) java.home system properties, and other sensitive information such as installation directories.
	</description>
 </metadata>
<!-- ee6b5b7a363e1901fa4a8a9786cb015e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064819" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064820" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064821" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064822" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064823" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.2-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064824" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.2-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3864</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864" source="CVE"/>
	<description>
	Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
	</description>
 </metadata>
<!-- 50538083731ac0d0f4674f55be4a9de9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064431" comment="libopenssl-devel less than 0.9.8h-28.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064432" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064433" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064434" comment="libopenssl0_9_8 less than 0.9.8h-28.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064435" comment="openssl-doc less than 0.9.8h-28.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064436" comment="openssl less than 0.9.8h-28.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3870</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3870" source="CVE"/>
	<description>
	The utf8_decode function in PHP before 5.3.4 does not properly handle non-shortest form UTF-8 encoding and ill-formed subsequences in UTF-8 data, which makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string.
	</description>
 </metadata>
<!-- 8107cbeafc0794f40711a2548bab0d60 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062580" comment="php5-hash less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062583" comment="php5-json less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064714" comment="php5-readline less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062613" comment="php5-tidy less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064715" comment="php5-xmlwriter less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064716" comment="php5-zip less than 5.2.14-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3874</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3874" source="CVE"/>
	<description>
	Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3976</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3976" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a file that is processed by Flash Player.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3996</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-3996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3996" source="CVE"/>
	<description>
	festival_server in Centre for Speech Technology Research (CSTR) Festival, probably 2.0.95-beta and earlier, places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
	</description>
 </metadata>
<!-- a66c9e550edb68911c494a2f01d0da5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063837" comment="festival-devel less than 1.96-72.71.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063838" comment="festival less than 1.96-72.71.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4008</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4008" source="CVE"/>
	<description>
	libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.
	</description>
 </metadata>
<!-- ac91028476d2b41921d628b3b81e5ec0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064600" comment="libxml2-32bit less than 2.7.1-9.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064601" comment="libxml2-64bit less than 2.7.1-9.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064602" comment="libxml2-devel-32bit less than 2.7.1-9.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064603" comment="libxml2-devel-64bit less than 2.7.1-9.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064604" comment="libxml2-devel less than 2.7.1-9.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064605" comment="libxml2-doc less than 2.7.1-9.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064606" comment="libxml2 less than 2.7.1-9.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4020</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.
	</description>
 </metadata>
<!-- c8c28ea32e843131e4622c708eb77d1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065125" comment="krb5-32bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065126" comment="krb5-64bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065127" comment="krb5-apps-clients less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065128" comment="krb5-apps-servers less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065129" comment="krb5-client less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065130" comment="krb5-devel-32bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065131" comment="krb5-devel-64bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065132" comment="krb5-devel less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065133" comment="krb5-plugin-kdb-ldap less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065134" comment="krb5-plugin-preauth-pkinit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065135" comment="krb5-server less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065136" comment="krb5 less than 1.6.3-132.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4021</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021" source="CVE"/>
	<description>
	The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a "KrbFastReq forgery issue."
	</description>
 </metadata>
<!-- c8c28ea32e843131e4622c708eb77d1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065125" comment="krb5-32bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065126" comment="krb5-64bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065127" comment="krb5-apps-clients less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065128" comment="krb5-apps-servers less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065129" comment="krb5-client less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065130" comment="krb5-devel-32bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065131" comment="krb5-devel-64bit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065132" comment="krb5-devel less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065133" comment="krb5-plugin-kdb-ldap less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065134" comment="krb5-plugin-preauth-pkinit less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065135" comment="krb5-server less than 1.6.3-132.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065136" comment="krb5 less than 1.6.3-132.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4072</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4072" source="CVE"/>
	<description>
	The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4073</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4073" source="CVE"/>
	<description>
	The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4078</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4078" source="CVE"/>
	<description>
	The sisfb_ioctl function in drivers/video/sis/sis_main.c in the Linux kernel before 2.6.36-rc6 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FBIOGET_VBLANK ioctl call.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4080</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4080" source="CVE"/>
	<description>
	The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4081</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4081" source="CVE"/>
	<description>
	The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4082</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4082" source="CVE"/>
	<description>
	The viafb_ioctl_get_viafb_info function in drivers/video/via/ioctl.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a VIAFB_GET_INFO ioctl call.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4083</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4083" source="CVE"/>
	<description>
	The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4091</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091" source="CVE"/>
	<description>
	The EScript.api plugin in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.1, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document that triggers memory corruption, involving the printSeps function. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 82eec958a08d3fc6d0b6d3f26f80f91b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064857" comment="acroread-cmaps less than 9.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064858" comment="acroread-fonts-ja less than 9.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064859" comment="acroread-fonts-ko less than 9.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064860" comment="acroread-fonts-zh_CN less than 9.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064861" comment="acroread-fonts-zh_TW less than 9.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064862" comment="acroread less than 9.4.1-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4157</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4157" source="CVE"/>
	<description>
	Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4158</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4158" source="CVE"/>
	<description>
	The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4162</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4162" source="CVE"/>
	<description>
	Multiple integer overflows in fs/bio.c in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (system crash) via a crafted device ioctl to a SCSI device.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4164</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164" source="CVE"/>
	<description>
	Multiple integer underflows in the x25_parse_facilities function in net/x25/x25_facilities.c in the Linux kernel before 2.6.36.2 allow remote attackers to cause a denial of service (system crash) via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3) X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data, a different vulnerability than CVE-2010-3873.
	</description>
 </metadata>
<!-- dffcf5c45f6764c5b5f8db8f8539da3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065055" comment="kernel-debug-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065056" comment="kernel-debug-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065057" comment="kernel-debug less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065058" comment="kernel-default-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065059" comment="kernel-default-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065060" comment="kernel-default less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065061" comment="kernel-docs less than 2.6.3-3.13.135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065062" comment="kernel-kdump less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065063" comment="kernel-pae-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065064" comment="kernel-pae-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065065" comment="kernel-pae less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065066" comment="kernel-ppc64-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065067" comment="kernel-ppc64-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065068" comment="kernel-ppc64 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065069" comment="kernel-ps3 less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065070" comment="kernel-source less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065071" comment="kernel-syms less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065072" comment="kernel-trace-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065073" comment="kernel-trace-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065074" comment="kernel-trace less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065075" comment="kernel-vanilla less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065076" comment="kernel-xen-base less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065077" comment="kernel-xen-extra less than 2.6.27.56-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065078" comment="kernel-xen less than 2.6.27.56-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4180</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4180" source="CVE"/>
	<description>
	OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
	</description>
 </metadata>
<!-- d5b31ed982ed1f2e0bb8cb00579ee6aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065443" comment="libopenssl-devel less than 0.9.8h-28.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065444" comment="libopenssl0_9_8-32bit less than 0.9.8h-28.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065445" comment="libopenssl0_9_8-64bit less than 0.9.8h-28.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065446" comment="libopenssl0_9_8 less than 0.9.8h-28.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065447" comment="openssl-doc less than 0.9.8h-28.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065448" comment="openssl less than 0.9.8h-28.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4207</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4207" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the Flash component infrastructure in YUI 2.4.0 through 2.8.1, as used in Bugzilla, Moodle, and other products, allows remote attackers to inject arbitrary web script or HTML via vectors related to charts/assets/charts.swf.
	</description>
 </metadata>
<!-- fdf470952caf94277ca90ed8b08838a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064338" comment="moodle-af less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064339" comment="moodle-ar less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064340" comment="moodle-be less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064341" comment="moodle-bg less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064342" comment="moodle-bs less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064343" comment="moodle-ca less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064344" comment="moodle-cs less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064345" comment="moodle-da less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064346" comment="moodle-de less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064347" comment="moodle-de_du less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064348" comment="moodle-el less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064349" comment="moodle-es less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064350" comment="moodle-et less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064351" comment="moodle-eu less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064352" comment="moodle-fa less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064353" comment="moodle-fi less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064354" comment="moodle-fr less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064355" comment="moodle-ga less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064356" comment="moodle-gl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064357" comment="moodle-he less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064358" comment="moodle-hi less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064359" comment="moodle-hr less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064360" comment="moodle-hu less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064361" comment="moodle-id less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064362" comment="moodle-is less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064363" comment="moodle-it less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064364" comment="moodle-ja less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064365" comment="moodle-ka less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064366" comment="moodle-km less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064367" comment="moodle-kn less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064368" comment="moodle-ko less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064369" comment="moodle-lt less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064370" comment="moodle-lv less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064371" comment="moodle-mi_tn less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064372" comment="moodle-ms less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064373" comment="moodle-nl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064374" comment="moodle-nn less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064375" comment="moodle-no less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064376" comment="moodle-pl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064377" comment="moodle-pt less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064378" comment="moodle-ro less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064379" comment="moodle-ru less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064380" comment="moodle-sk less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064381" comment="moodle-sl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064382" comment="moodle-so less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064383" comment="moodle-sq less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064384" comment="moodle-sr less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064385" comment="moodle-sv less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064386" comment="moodle-th less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064387" comment="moodle-tl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064388" comment="moodle-tr less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064389" comment="moodle-uk less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064390" comment="moodle-vi less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064391" comment="moodle-zh_cn less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064392" comment="moodle less than 1.9.10-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4208</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4208" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the Flash component infrastructure in YUI 2.5.0 through 2.8.1, as used in Bugzilla, Moodle, and other products, allows remote attackers to inject arbitrary web script or HTML via vectors related to uploader/assets/uploader.swf.
	</description>
 </metadata>
<!-- fdf470952caf94277ca90ed8b08838a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064338" comment="moodle-af less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064339" comment="moodle-ar less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064340" comment="moodle-be less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064341" comment="moodle-bg less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064342" comment="moodle-bs less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064343" comment="moodle-ca less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064344" comment="moodle-cs less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064345" comment="moodle-da less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064346" comment="moodle-de less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064347" comment="moodle-de_du less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064348" comment="moodle-el less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064349" comment="moodle-es less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064350" comment="moodle-et less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064351" comment="moodle-eu less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064352" comment="moodle-fa less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064353" comment="moodle-fi less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064354" comment="moodle-fr less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064355" comment="moodle-ga less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064356" comment="moodle-gl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064357" comment="moodle-he less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064358" comment="moodle-hi less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064359" comment="moodle-hr less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064360" comment="moodle-hu less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064361" comment="moodle-id less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064362" comment="moodle-is less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064363" comment="moodle-it less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064364" comment="moodle-ja less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064365" comment="moodle-ka less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064366" comment="moodle-km less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064367" comment="moodle-kn less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064368" comment="moodle-ko less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064369" comment="moodle-lt less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064370" comment="moodle-lv less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064371" comment="moodle-mi_tn less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064372" comment="moodle-ms less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064373" comment="moodle-nl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064374" comment="moodle-nn less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064375" comment="moodle-no less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064376" comment="moodle-pl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064377" comment="moodle-pt less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064378" comment="moodle-ro less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064379" comment="moodle-ru less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064380" comment="moodle-sk less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064381" comment="moodle-sl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064382" comment="moodle-so less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064383" comment="moodle-sq less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064384" comment="moodle-sr less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064385" comment="moodle-sv less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064386" comment="moodle-th less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064387" comment="moodle-tl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064388" comment="moodle-tr less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064389" comment="moodle-uk less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064390" comment="moodle-vi less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064391" comment="moodle-zh_cn less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064392" comment="moodle less than 1.9.10-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4209</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4209" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the Flash component infrastructure in YUI 2.8.0 through 2.8.1, as used in Bugzilla 3.7.1 through 3.7.3 and 4.1, allows remote attackers to inject arbitrary web script or HTML via vectors related to swfstore/swfstore.swf.
	</description>
 </metadata>
<!-- fdf470952caf94277ca90ed8b08838a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064338" comment="moodle-af less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064339" comment="moodle-ar less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064340" comment="moodle-be less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064341" comment="moodle-bg less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064342" comment="moodle-bs less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064343" comment="moodle-ca less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064344" comment="moodle-cs less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064345" comment="moodle-da less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064346" comment="moodle-de less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064347" comment="moodle-de_du less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064348" comment="moodle-el less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064349" comment="moodle-es less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064350" comment="moodle-et less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064351" comment="moodle-eu less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064352" comment="moodle-fa less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064353" comment="moodle-fi less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064354" comment="moodle-fr less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064355" comment="moodle-ga less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064356" comment="moodle-gl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064357" comment="moodle-he less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064358" comment="moodle-hi less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064359" comment="moodle-hr less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064360" comment="moodle-hu less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064361" comment="moodle-id less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064362" comment="moodle-is less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064363" comment="moodle-it less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064364" comment="moodle-ja less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064365" comment="moodle-ka less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064366" comment="moodle-km less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064367" comment="moodle-kn less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064368" comment="moodle-ko less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064369" comment="moodle-lt less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064370" comment="moodle-lv less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064371" comment="moodle-mi_tn less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064372" comment="moodle-ms less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064373" comment="moodle-nl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064374" comment="moodle-nn less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064375" comment="moodle-no less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064376" comment="moodle-pl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064377" comment="moodle-pt less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064378" comment="moodle-ro less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064379" comment="moodle-ru less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064380" comment="moodle-sk less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064381" comment="moodle-sl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064382" comment="moodle-so less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064383" comment="moodle-sq less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064384" comment="moodle-sr less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064385" comment="moodle-sv less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064386" comment="moodle-th less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064387" comment="moodle-tl less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064388" comment="moodle-tr less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064389" comment="moodle-uk less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064390" comment="moodle-vi less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064391" comment="moodle-zh_cn less than 1.9.10-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064392" comment="moodle less than 1.9.10-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4260</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4260" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV before 0.96.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document, aka (1) "bb #2358" and (2) "bb #2396."
	</description>
 </metadata>
<!-- 94c4a8f903f769dd6dba17f4714711ba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064996" comment="clamav-db less than 0.96.5-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064950" comment="clamav less than 0.96.5-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4261</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4261" source="CVE"/>
	<description>
	Off-by-one error in the icon_cb function in pe_icons.c in libclamav in ClamAV before 0.96.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 94c4a8f903f769dd6dba17f4714711ba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064996" comment="clamav-db less than 0.96.5-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064950" comment="clamav less than 0.96.5-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4300</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4300" source="CVE"/>
	<description>
	Heap-based buffer overflow in the dissect_ldss_transfer function (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.
	</description>
 </metadata>
<!-- c6154f4e14e9cb7679828da0ff02362d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065421" comment="wireshark-devel less than 1.4.2-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065422" comment="wireshark less than 1.4.2-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4301</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4301" source="CVE"/>
	<description>
	epan/dissectors/packet-zbee-zcl.c in the ZigBee ZCL dissector in Wireshark 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted ZCL packet, related to Discover Attributes.
	</description>
 </metadata>
<!-- c6154f4e14e9cb7679828da0ff02362d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065421" comment="wireshark-devel less than 1.4.2-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065422" comment="wireshark less than 1.4.2-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4344</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4344" source="CVE"/>
	<description>
	Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
	</description>
 </metadata>
<!-- 8c1215bc2f7e5cfe622c100c40347cc2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065162" comment="exim less than 4.69-70.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065163" comment="eximon less than 4.69-70.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065164" comment="eximstats-html less than 4.69-70.15.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4345</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4345" source="CVE"/>
	<description>
	Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
	</description>
 </metadata>
<!-- 8c1215bc2f7e5cfe622c100c40347cc2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065162" comment="exim less than 4.69-70.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065163" comment="eximon less than 4.69-70.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065164" comment="eximstats-html less than 4.69-70.15.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4508</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4508" source="CVE"/>
	<description>
	The WebSockets implementation in Mozilla Firefox 4 through 4.0 Beta 7 does not properly perform proxy upgrade negotiation, which has unspecified impact and remote attack vectors, related to an "inherent problem" with the WebSocket specification.
	</description>
 </metadata>
<!-- 51350edaf84f43a6bb530cf889ca4950 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065324" comment="opera-gtk less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065325" comment="opera-kde4 less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065326" comment="opera less than 11.00-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4523</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4523" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13 and earlier allow physically proximate attackers to execute arbitrary code via a long serial-number field on a smart card, related to (1) card-acos5.c, (2) card-atrust-acos.c, and (3) card-starcos.c.
	</description>
 </metadata>
<!-- 312bb87a60393e57ffea137c0115ade6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065499" comment="libopensc2-32bit less than 0.11.6-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065500" comment="libopensc2-64bit less than 0.11.6-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065501" comment="libopensc2 less than 0.11.6-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065502" comment="opensc-32bit less than 0.11.6-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065503" comment="opensc-64bit less than 0.11.6-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065504" comment="opensc-devel less than 0.11.6-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065505" comment="opensc less than 0.11.6-5.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4579</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4579" source="CVE"/>
	<description>
	Opera before 11.00 does not properly constrain dialogs to appear on top of rendered documents, which makes it easier for remote attackers to trick users into interacting with a crafted web site that spoofs the (1) security information dialog or (2) download dialog.
	</description>
 </metadata>
<!-- 51350edaf84f43a6bb530cf889ca4950 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065324" comment="opera-gtk less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065325" comment="opera-kde4 less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065326" comment="opera less than 11.00-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4580</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4580" source="CVE"/>
	<description>
	Opera before 11.00 does not clear WAP WML form fields after manual navigation to a new web site, which allows remote attackers to obtain sensitive information via an input field that has the same name as an input field on a previously visited web site.
	</description>
 </metadata>
<!-- 51350edaf84f43a6bb530cf889ca4950 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065324" comment="opera-gtk less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065325" comment="opera-kde4 less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065326" comment="opera less than 11.00-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4581</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4581" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 11.00 has unknown impact and attack vectors, related to "a high severity issue."
	</description>
 </metadata>
<!-- 51350edaf84f43a6bb530cf889ca4950 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065324" comment="opera-gtk less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065325" comment="opera-kde4 less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065326" comment="opera less than 11.00-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4582</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4582" source="CVE"/>
	<description>
	Opera before 11.00 does not properly handle security policies during updates to extensions, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.
	</description>
 </metadata>
<!-- 51350edaf84f43a6bb530cf889ca4950 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065324" comment="opera-gtk less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065325" comment="opera-kde4 less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065326" comment="opera less than 11.00-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4583</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4583" source="CVE"/>
	<description>
	Opera before 11.00, when Opera Turbo is enabled, does not display a page's security indication, which makes it easier for remote attackers to spoof trusted content via a crafted web site.
	</description>
 </metadata>
<!-- 51350edaf84f43a6bb530cf889ca4950 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065324" comment="opera-gtk less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065325" comment="opera-kde4 less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065326" comment="opera less than 11.00-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4584</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4584" source="CVE"/>
	<description>
	Opera before 11.00, when Opera Turbo is used, does not properly present information about problematic X.509 certificates on https web sites, which might make it easier for remote attackers to spoof trusted content via a crafted web site.
	</description>
 </metadata>
<!-- 51350edaf84f43a6bb530cf889ca4950 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065324" comment="opera-gtk less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065325" comment="opera-kde4 less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065326" comment="opera less than 11.00-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4585</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4585" source="CVE"/>
	<description>
	Unspecified vulnerability in the auto-update functionality in Opera before 11.00 allows remote attackers to cause a denial of service (application crash) by triggering an Opera Unite update.
	</description>
 </metadata>
<!-- 51350edaf84f43a6bb530cf889ca4950 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065324" comment="opera-gtk less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065325" comment="opera-kde4 less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065326" comment="opera less than 11.00-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4586</title>
	<affected family="unix">
		<platform>openSUSE 11.1</platform>
	</affected>
	<reference ref_id="CVE-2010-4586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4586" source="CVE"/>
	<description>
	The default configuration of Opera before 11.00 enables WebSockets functionality, which has unspecified impact and remote attack vectors, possibly a related issue to CVE-2010-4508.
	</description>
 </metadata>
<!-- 51350edaf84f43a6bb530cf889ca4950 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009044425" comment="suse111 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065324" comment="opera-gtk less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065325" comment="opera-kde4 less than 11.00-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065326" comment="opera less than 11.00-1.1.1"/>
	</criteria>
</criteria>
</definition>
 </definitions>
 <tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044425" version="1" comment="openSUSE-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056428" version="1" comment="kernel-debug-base is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056429" version="1" comment="kernel-debug-extra is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056430" version="1" comment="kernel-debug is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056431" version="1" comment="kernel-default-base is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056432" version="1" comment="kernel-default-extra is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056433" version="1" comment="kernel-default is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056434" version="1" comment="kernel-docs is &lt;2.6.3-3.13.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056435" version="1" comment="kernel-kdump is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056436" version="1" comment="kernel-pae-base is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056437" version="1" comment="kernel-pae-extra is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056438" version="1" comment="kernel-pae is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056439" version="1" comment="kernel-ppc64-base is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056440" version="1" comment="kernel-ppc64-extra is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056441" version="1" comment="kernel-ppc64 is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056442" version="1" comment="kernel-ps3 is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056443" version="1" comment="kernel-source is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056444" version="1" comment="kernel-syms is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056445" version="1" comment="kernel-trace-base is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056446" version="1" comment="kernel-trace-extra is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056447" version="1" comment="kernel-trace is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056448" version="1" comment="kernel-vanilla is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056449" version="1" comment="kernel-xen-base is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056450" version="1" comment="kernel-xen-extra is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056451" version="1" comment="kernel-xen is &lt;2.6.27.39-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055727" version="1" comment="acroread is &lt;8.1.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044426" version="1" comment="kvm is &lt;78-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047601" version="1" comment="libmikmod-32bit is &lt;3.1.11a-71.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047602" version="1" comment="libmikmod-64bit is &lt;3.1.11a-71.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047603" version="1" comment="libmikmod-devel is &lt;3.1.11a-71.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047604" version="1" comment="libmikmod is &lt;3.1.11a-71.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047631" version="1" comment="ghostscript-devel is &lt;8.62-31.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047632" version="1" comment="ghostscript-fonts-other is &lt;8.62-31.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047633" version="1" comment="ghostscript-fonts-rus is &lt;8.62-31.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047634" version="1" comment="ghostscript-fonts-std is &lt;8.62-31.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047635" version="1" comment="ghostscript-ijs-devel is &lt;8.62-31.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047636" version="1" comment="ghostscript-library is &lt;8.62-31.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047637" version="1" comment="ghostscript-omni is &lt;8.62-31.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047638" version="1" comment="ghostscript-x11 is &lt;8.62-31.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047639" version="1" comment="libgimpprint-devel is &lt;4.2.7-31.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047640" version="1" comment="libgimpprint is &lt;4.2.7-31.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009044428" version="1" comment="qemu is &lt;0.10.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063995" version="1" comment="glibc-32bit is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063996" version="1" comment="glibc-64bit is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063997" version="1" comment="glibc-devel-32bit is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063998" version="1" comment="glibc-devel-64bit is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063999" version="1" comment="glibc-devel is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064000" version="1" comment="glibc-html is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064001" version="1" comment="glibc-i18ndata is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064002" version="1" comment="glibc-info is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064003" version="1" comment="glibc-locale-32bit is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064004" version="1" comment="glibc-locale-64bit is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064005" version="1" comment="glibc-locale is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064006" version="1" comment="glibc-obsolete is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064007" version="1" comment="glibc-profile-32bit is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064008" version="1" comment="glibc-profile-64bit is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064009" version="1" comment="glibc-profile is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064010" version="1" comment="glibc is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064011" version="1" comment="nscd is &lt;2.9-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048717" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-133.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048718" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-133.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048719" version="1" comment="libtiff-devel is &lt;3.8.2-133.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048720" version="1" comment="libtiff3-32bit is &lt;3.8.2-133.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048721" version="1" comment="libtiff3-64bit is &lt;3.8.2-133.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048722" version="1" comment="libtiff3 is &lt;3.8.2-133.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048723" version="1" comment="tiff is &lt;3.8.2-133.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048977" version="1" comment="struts-javadoc is &lt;1.2.9-162.163.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048978" version="1" comment="struts-manual is &lt;1.2.9-162.163.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048979" version="1" comment="struts-webapps-tomcat6 is &lt;1.2.9-162.163.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048980" version="1" comment="struts is &lt;1.2.9-162.163.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049001" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update17-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049002" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update17-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049003" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update17-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049004" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update17-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049005" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update17-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049006" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u11-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049007" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u11-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049008" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u11-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049009" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u11-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049010" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u11-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049301" version="1" comment="courier-authlib-devel is &lt;0.61.0-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049302" version="1" comment="courier-authlib-ldap is &lt;0.61.0-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049303" version="1" comment="courier-authlib-mysql is &lt;0.61.0-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049304" version="1" comment="courier-authlib-pgsql is &lt;0.61.0-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049305" version="1" comment="courier-authlib-pipe is &lt;0.61.0-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049306" version="1" comment="courier-authlib-userdb is &lt;0.61.0-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049307" version="1" comment="courier-authlib is &lt;0.61.0-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049315" version="1" comment="courier-authlib-devel is &lt;0.61.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049316" version="1" comment="courier-authlib-ldap is &lt;0.61.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049317" version="1" comment="courier-authlib-mysql is &lt;0.61.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049318" version="1" comment="courier-authlib-pgsql is &lt;0.61.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049319" version="1" comment="courier-authlib-pipe is &lt;0.61.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049320" version="1" comment="courier-authlib-userdb is &lt;0.61.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049321" version="1" comment="courier-authlib is &lt;0.61.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049323" version="1" comment="xterm is &lt;236-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049359" version="1" comment="gvim is &lt;7.2-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049360" version="1" comment="vim-base is &lt;7.2-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049361" version="1" comment="vim-data is &lt;7.2-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049362" version="1" comment="vim-enhanced is &lt;7.2-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053202" version="1" comment="ruby-devel is &lt;1.8.7.p72-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053203" version="1" comment="ruby-doc-html is &lt;1.8.7.p72-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053204" version="1" comment="ruby-doc-ri is &lt;1.8.7.p72-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053205" version="1" comment="ruby-examples is &lt;1.8.7.p72-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053206" version="1" comment="ruby-test-suite is &lt;1.8.7.p72-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053207" version="1" comment="ruby-tk is &lt;1.8.7.p72-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053208" version="1" comment="ruby is &lt;1.8.7.p72-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065275" version="1" comment="ed is &lt;0.2-1001.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050468" version="1" comment="dbus-1-32bit is &lt;1.2.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050469" version="1" comment="dbus-1-64bit is &lt;1.2.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050470" version="1" comment="dbus-1-devel-doc is &lt;1.2.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050471" version="1" comment="dbus-1-devel is &lt;1.2.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050472" version="1" comment="dbus-1 is &lt;1.2.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050501" version="1" comment="hal-32bit is &lt;0.5.12-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050502" version="1" comment="hal-64bit is &lt;0.5.12-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050503" version="1" comment="hal-devel is &lt;0.5.12-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050504" version="1" comment="hal is &lt;0.5.12-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050505" version="1" comment="gnome-panel-32bit is &lt;2.24.1-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050506" version="1" comment="gnome-panel-devel is &lt;2.24.1-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050507" version="1" comment="gnome-panel-doc is &lt;2.24.1-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050508" version="1" comment="gnome-panel-extras is &lt;2.24.1-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050509" version="1" comment="gnome-panel-lang is &lt;2.24.1-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050510" version="1" comment="gnome-panel is &lt;2.24.1-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050539" version="1" comment="dbus-1-32bit is &lt;1.2.10-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050540" version="1" comment="dbus-1-64bit is &lt;1.2.10-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050541" version="1" comment="dbus-1-devel-doc is &lt;1.2.10-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050542" version="1" comment="dbus-1-devel is &lt;1.2.10-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050543" version="1" comment="dbus-1-glib-32bit is &lt;0.76-32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050544" version="1" comment="dbus-1-glib-64bit is &lt;0.76-32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050545" version="1" comment="dbus-1-glib-devel is &lt;0.76-32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050546" version="1" comment="dbus-1-glib-doc is &lt;0.76-32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050547" version="1" comment="dbus-1-glib is &lt;0.76-32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050548" version="1" comment="dbus-1-mono is &lt;0.63-118.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050549" version="1" comment="dbus-1-python-devel is &lt;0.83.0-22.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050550" version="1" comment="dbus-1-python is &lt;0.83.0-22.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050551" version="1" comment="dbus-1-qt3-32bit is &lt;0.62-221.222.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050552" version="1" comment="dbus-1-qt3-64bit is &lt;0.62-221.222.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050553" version="1" comment="dbus-1-qt3-devel is &lt;0.62-221.222.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050554" version="1" comment="dbus-1-qt3 is &lt;0.62-221.222.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050555" version="1" comment="dbus-1-x11 is &lt;1.2.10-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050556" version="1" comment="dbus-1 is &lt;1.2.10-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050565" version="1" comment="PackageKit-devel is &lt;0.3.11-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050566" version="1" comment="PackageKit-lang is &lt;0.3.11-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050567" version="1" comment="PackageKit is &lt;0.3.11-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050568" version="1" comment="libpackagekit-glib10-devel is &lt;0.3.11-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050569" version="1" comment="libpackagekit-glib10 is &lt;0.3.11-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050570" version="1" comment="libpackagekit-qt10-devel is &lt;0.3.11-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050571" version="1" comment="libpackagekit-qt10 is &lt;0.3.11-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050576" version="1" comment="PolicyKit-32bit is &lt;0.9-13.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050577" version="1" comment="PolicyKit-64bit is &lt;0.9-13.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050578" version="1" comment="PolicyKit-devel is &lt;0.9-13.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050579" version="1" comment="PolicyKit is &lt;0.9-13.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050590" version="1" comment="ConsoleKit-32bit is &lt;0.2.10-60.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050591" version="1" comment="ConsoleKit-64bit is &lt;0.2.10-60.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050592" version="1" comment="ConsoleKit-devel is &lt;0.2.10-60.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050593" version="1" comment="ConsoleKit-x11 is &lt;0.2.10-60.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050594" version="1" comment="ConsoleKit is &lt;0.2.10-60.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050661" version="1" comment="cifs-mount is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050662" version="1" comment="ldapsmb is &lt;1.34b-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050663" version="1" comment="libnetapi-devel is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050664" version="1" comment="libnetapi0 is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050665" version="1" comment="libsmbclient-devel is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050666" version="1" comment="libsmbclient0-32bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050667" version="1" comment="libsmbclient0-64bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050668" version="1" comment="libsmbclient0 is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050669" version="1" comment="libsmbsharemodes-devel is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050670" version="1" comment="libsmbsharemodes0 is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050671" version="1" comment="libtalloc-devel is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050672" version="1" comment="libtalloc1-32bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050673" version="1" comment="libtalloc1-64bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050674" version="1" comment="libtalloc1 is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050675" version="1" comment="libtdb-devel is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050676" version="1" comment="libtdb1-32bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050677" version="1" comment="libtdb1-64bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050678" version="1" comment="libtdb1 is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050679" version="1" comment="libwbclient-devel is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050680" version="1" comment="libwbclient0-32bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050681" version="1" comment="libwbclient0-64bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050682" version="1" comment="libwbclient0 is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050683" version="1" comment="samba-32bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050684" version="1" comment="samba-64bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050685" version="1" comment="samba-client-32bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050686" version="1" comment="samba-client-64bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050687" version="1" comment="samba-client is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050688" version="1" comment="samba-devel is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050689" version="1" comment="samba-krb-printing is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050690" version="1" comment="samba-vscan is &lt;0.3.6b-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050691" version="1" comment="samba-winbind-32bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050692" version="1" comment="samba-winbind-64bit is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050693" version="1" comment="samba-winbind is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050694" version="1" comment="samba is &lt;3.2.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050695" version="1" comment="keyutils is &lt;1.2-107.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050696" version="1" comment="keyutils is &lt;1.2-107.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050772" version="1" comment="glib2-branding-upstream is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050773" version="1" comment="glib2-devel is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050774" version="1" comment="glib2-doc is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050775" version="1" comment="glib2-lang is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050776" version="1" comment="glib2 is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050777" version="1" comment="libgio-2_0-0-32bit is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050778" version="1" comment="libgio-2_0-0-64bit is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050779" version="1" comment="libgio-2_0-0 is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050780" version="1" comment="libgio-fam is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050781" version="1" comment="libglib-2_0-0-32bit is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050782" version="1" comment="libglib-2_0-0-64bit is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050783" version="1" comment="libglib-2_0-0 is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050784" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050785" version="1" comment="libgmodule-2_0-0-64bit is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050786" version="1" comment="libgmodule-2_0-0 is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050787" version="1" comment="libgobject-2_0-0-32bit is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050788" version="1" comment="libgobject-2_0-0-64bit is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050789" version="1" comment="libgobject-2_0-0 is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050790" version="1" comment="libgthread-2_0-0-32bit is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050791" version="1" comment="libgthread-2_0-0-64bit is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050792" version="1" comment="libgthread-2_0-0 is &lt;2.18.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056486" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056487" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056488" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056489" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056490" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056491" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056492" version="1" comment="lighttpd is &lt;1.4.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054336" version="1" comment="libmysqlclient-devel is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054337" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054338" version="1" comment="libmysqlclient15-64bit is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054339" version="1" comment="libmysqlclient15 is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054340" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054341" version="1" comment="libmysqlclient_r15-64bit is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054342" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054343" version="1" comment="mysql-Max is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054344" version="1" comment="mysql-bench is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054345" version="1" comment="mysql-client is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054346" version="1" comment="mysql-debug is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054347" version="1" comment="mysql-test is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054348" version="1" comment="mysql-tools is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054349" version="1" comment="mysql is &lt;5.0.67-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060833" version="1" comment="flash-player is &lt;10.1.53.64-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050858" version="1" comment="jhead is &lt;2.84-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065276" version="1" comment="kdenetwork3-IRC is &lt;3.5.10-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065277" version="1" comment="kdenetwork3-InstantMessenger is &lt;3.5.10-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065278" version="1" comment="kdenetwork3-devel is &lt;3.5.10-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065279" version="1" comment="kdenetwork3-dialup is &lt;3.5.10-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065280" version="1" comment="kdenetwork3-lan is &lt;3.5.10-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065281" version="1" comment="kdenetwork3-lisa is &lt;3.5.10-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065282" version="1" comment="kdenetwork3-news is &lt;3.5.10-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065283" version="1" comment="kdenetwork3-query is &lt;3.5.10-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065284" version="1" comment="kdenetwork3-vnc is &lt;3.5.10-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065285" version="1" comment="kdenetwork3-wireless is &lt;3.5.10-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065286" version="1" comment="kdenetwork3 is &lt;3.5.10-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065214" version="1" comment="kde4-kdnssd is &lt;4.1.3-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065215" version="1" comment="kde4-kget is &lt;4.1.3-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065216" version="1" comment="kde4-knewsticker is &lt;4.1.3-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065217" version="1" comment="kde4-kopete-devel is &lt;4.1.3-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065218" version="1" comment="kde4-kopete is &lt;4.1.3-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065219" version="1" comment="kde4-kppp is &lt;4.1.3-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065220" version="1" comment="kde4-krdc is &lt;4.1.3-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065221" version="1" comment="kde4-krfb is &lt;4.1.3-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065222" version="1" comment="kdenetwork4-filesharing is &lt;4.1.3-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065223" version="1" comment="kdenetwork4 is &lt;4.1.3-4.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050981" version="1" comment="gnutls is &lt;2.4.1-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050982" version="1" comment="libgnutls-devel is &lt;2.4.1-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050983" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050984" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050985" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050986" version="1" comment="libgnutls26-64bit is &lt;2.4.1-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050987" version="1" comment="libgnutls26 is &lt;2.4.1-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051008" version="1" comment="imap-devel is &lt;2006c1_suse-127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051009" version="1" comment="imap-lib is &lt;2006c1_suse-127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051016" version="1" comment="nagios-devel is &lt;3.0.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051017" version="1" comment="nagios-www is &lt;3.0.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051018" version="1" comment="nagios is &lt;3.0.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051035" version="1" comment="libopenssl-devel is &lt;0.9.8h-28.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051036" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-28.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051037" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8h-28.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051038" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-28.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051039" version="1" comment="openssl-certs is &lt;0.9.8h-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051040" version="1" comment="openssl-doc is &lt;0.9.8h-28.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051041" version="1" comment="openssl is &lt;0.9.8h-28.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051045" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-145.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051046" version="1" comment="compat-openssl097g-64bit is &lt;0.9.7g-145.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051047" version="1" comment="compat-openssl097g is &lt;0.9.7g-145.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051055" version="1" comment="kernel-debug-base is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051056" version="1" comment="kernel-debug-extra is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051057" version="1" comment="kernel-debug is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051058" version="1" comment="kernel-default-base is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051059" version="1" comment="kernel-default-extra is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051060" version="1" comment="kernel-default is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051061" version="1" comment="kernel-docs is &lt;2.6.3-3.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051062" version="1" comment="kernel-kdump is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051063" version="1" comment="kernel-pae-base is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051064" version="1" comment="kernel-pae-extra is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051065" version="1" comment="kernel-pae is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051066" version="1" comment="kernel-ppc64-base is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051067" version="1" comment="kernel-ppc64-extra is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051068" version="1" comment="kernel-ppc64 is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051069" version="1" comment="kernel-ps3 is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051070" version="1" comment="kernel-source is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051071" version="1" comment="kernel-syms is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051072" version="1" comment="kernel-trace-base is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051073" version="1" comment="kernel-trace-extra is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051074" version="1" comment="kernel-trace is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051075" version="1" comment="kernel-vanilla is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051076" version="1" comment="kernel-xen-base is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051077" version="1" comment="kernel-xen-extra is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051078" version="1" comment="kernel-xen is &lt;2.6.27.19-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051104" version="1" comment="avahi-compat-howl-devel is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051105" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051106" version="1" comment="avahi-utils is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051107" version="1" comment="avahi is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051108" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051109" version="1" comment="libavahi-client3-64bit is &lt;0.6.23-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051110" version="1" comment="libavahi-client3 is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051111" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051112" version="1" comment="libavahi-common3-64bit is &lt;0.6.23-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051113" version="1" comment="libavahi-common3 is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051114" version="1" comment="libavahi-core5 is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051115" version="1" comment="libavahi-devel is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051116" version="1" comment="libavahi-glib-devel is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051117" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051118" version="1" comment="libavahi-glib1-64bit is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051119" version="1" comment="libavahi-glib1 is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051120" version="1" comment="libavahi-gobject-devel is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051121" version="1" comment="libavahi-gobject0 is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051122" version="1" comment="libavahi-ui0 is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051123" version="1" comment="libdns_sd-32bit is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051124" version="1" comment="libdns_sd-64bit is &lt;0.6.23-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051125" version="1" comment="libdns_sd is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051126" version="1" comment="libhowl0 is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051127" version="1" comment="python-avahi is &lt;0.6.23-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051138" version="1" comment="libvirt-devel is &lt;0.4.6-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051139" version="1" comment="libvirt-doc is &lt;0.4.6-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051140" version="1" comment="libvirt-python is &lt;0.4.6-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051141" version="1" comment="libvirt is &lt;0.4.6-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051143" version="1" comment="optipng is &lt;0.6.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051147" version="1" comment="pam_mount-32bit is &lt;0.47-12.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051148" version="1" comment="pam_mount-64bit is &lt;0.47-12.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051149" version="1" comment="pam_mount is &lt;0.47-12.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051184" version="1" comment="wireshark-devel is &lt;1.0.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051185" version="1" comment="wireshark is &lt;1.0.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051186" version="1" comment="wireshark-devel is &lt;1.0.4-2.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051187" version="1" comment="wireshark is &lt;1.0.4-2.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051193" version="1" comment="perl-32bit is &lt;5.10.0-62.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051194" version="1" comment="perl-64bit is &lt;5.10.0-62.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051195" version="1" comment="perl-base-32bit is &lt;5.10.0-62.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051196" version="1" comment="perl-base-64bit is &lt;5.10.0-62.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051197" version="1" comment="perl-base is &lt;5.10.0-62.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051198" version="1" comment="perl-doc is &lt;5.10.0-62.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051199" version="1" comment="perl is &lt;5.10.0-62.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051208" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.4_b14-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051209" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.4_b14-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051210" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.4_b14-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051211" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.4_b14-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051212" version="1" comment="java-1_6_0-openjdk-src is &lt;1.4_b14-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051213" version="1" comment="java-1_6_0-openjdk is &lt;1.4_b14-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051269" version="1" comment="apache2-mod_php5 is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051270" version="1" comment="php5-bcmath is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051271" version="1" comment="php5-bz2 is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051272" version="1" comment="php5-calendar is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051273" version="1" comment="php5-ctype is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051274" version="1" comment="php5-curl is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051275" version="1" comment="php5-dba is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051276" version="1" comment="php5-dbase is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051277" version="1" comment="php5-devel is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051278" version="1" comment="php5-dom is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051279" version="1" comment="php5-exif is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051280" version="1" comment="php5-fastcgi is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051281" version="1" comment="php5-ftp is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051282" version="1" comment="php5-gd is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051283" version="1" comment="php5-gettext is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051284" version="1" comment="php5-gmp is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051285" version="1" comment="php5-hash is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051286" version="1" comment="php5-iconv is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051287" version="1" comment="php5-imap is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051288" version="1" comment="php5-json is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051289" version="1" comment="php5-ldap is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051290" version="1" comment="php5-mbstring is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051291" version="1" comment="php5-mcrypt is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051292" version="1" comment="php5-mysql is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051293" version="1" comment="php5-ncurses is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051294" version="1" comment="php5-odbc is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051295" version="1" comment="php5-openssl is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051296" version="1" comment="php5-pcntl is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051297" version="1" comment="php5-pdo is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051298" version="1" comment="php5-pear is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051299" version="1" comment="php5-pgsql is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051300" version="1" comment="php5-posix is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051301" version="1" comment="php5-pspell is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051302" version="1" comment="php5-readline is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051303" version="1" comment="php5-shmop is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051304" version="1" comment="php5-snmp is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051305" version="1" comment="php5-soap is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051306" version="1" comment="php5-sockets is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051307" version="1" comment="php5-sqlite is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051308" version="1" comment="php5-suhosin is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051309" version="1" comment="php5-sysvmsg is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051310" version="1" comment="php5-sysvsem is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051311" version="1" comment="php5-sysvshm is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051312" version="1" comment="php5-tidy is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051313" version="1" comment="php5-tokenizer is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051314" version="1" comment="php5-wddx is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051315" version="1" comment="php5-xmlreader is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051316" version="1" comment="php5-xmlrpc is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051317" version="1" comment="php5-xmlwriter is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051318" version="1" comment="php5-xsl is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051319" version="1" comment="php5-zip is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051320" version="1" comment="php5-zlib is &lt;5.2.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051377" version="1" comment="flash-player is &lt;10.0.15.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036196" version="1" comment="seamonkey-dom-inspector is &lt;1.1.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036197" version="1" comment="seamonkey-irc is &lt;1.1.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036198" version="1" comment="seamonkey-mail is &lt;1.1.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036199" version="1" comment="seamonkey-spellchecker is &lt;1.1.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036200" version="1" comment="seamonkey-venkman is &lt;1.1.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036201" version="1" comment="seamonkey is &lt;1.1.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051395" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051396" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051397" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051398" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051399" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051400" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051401" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051402" version="1" comment="python-xpcom190 is &lt;1.9.0.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051409" version="1" comment="MozillaThunderbird-devel is &lt;2.0.0.19-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051410" version="1" comment="MozillaThunderbird-translations is &lt;2.0.0.19-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051411" version="1" comment="MozillaThunderbird is &lt;2.0.0.19-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051412" version="1" comment="mozilla-xulrunner181-32bit is &lt;1.8.1.19-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051413" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.19-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051414" version="1" comment="mozilla-xulrunner181-l10n-32bit is &lt;1.8.1.19-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051415" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.19-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051416" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.19-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051419" version="1" comment="MozillaFirefox-translations is &lt;3.0.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051420" version="1" comment="MozillaFirefox is &lt;3.0.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051437" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051438" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051439" version="1" comment="tomcat6-javadoc is &lt;6.0.18-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051440" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051441" version="1" comment="tomcat6-lib is &lt;6.0.18-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051442" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051443" version="1" comment="tomcat6-webapps is &lt;6.0.18-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051444" version="1" comment="tomcat6 is &lt;6.0.18-16.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059317" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-16.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059318" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-16.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059319" version="1" comment="tomcat6-javadoc is &lt;6.0.18-16.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059320" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-16.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059321" version="1" comment="tomcat6-lib is &lt;6.0.18-16.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059322" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-16.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059323" version="1" comment="tomcat6-webapps is &lt;6.0.18-16.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059324" version="1" comment="tomcat6 is &lt;6.0.18-16.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056033" version="1" comment="apache2-mod_jk is &lt;1.2.26-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051445" version="1" comment="apache2-mod_php5 is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051446" version="1" comment="php5-bcmath is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051447" version="1" comment="php5-bz2 is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051448" version="1" comment="php5-calendar is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051449" version="1" comment="php5-ctype is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051450" version="1" comment="php5-curl is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051451" version="1" comment="php5-dba is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051452" version="1" comment="php5-dbase is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051453" version="1" comment="php5-devel is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051454" version="1" comment="php5-dom is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051455" version="1" comment="php5-exif is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051456" version="1" comment="php5-fastcgi is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051457" version="1" comment="php5-ftp is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051458" version="1" comment="php5-gd is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051459" version="1" comment="php5-gettext is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051460" version="1" comment="php5-gmp is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051461" version="1" comment="php5-hash is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051462" version="1" comment="php5-iconv is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051463" version="1" comment="php5-imap is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051464" version="1" comment="php5-json is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051465" version="1" comment="php5-ldap is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051466" version="1" comment="php5-mbstring is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051467" version="1" comment="php5-mcrypt is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051468" version="1" comment="php5-mysql is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051469" version="1" comment="php5-ncurses is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051470" version="1" comment="php5-odbc is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051471" version="1" comment="php5-openssl is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051472" version="1" comment="php5-pcntl is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051473" version="1" comment="php5-pdo is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051474" version="1" comment="php5-pear is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051475" version="1" comment="php5-pgsql is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051476" version="1" comment="php5-posix is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051477" version="1" comment="php5-pspell is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051478" version="1" comment="php5-readline is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051479" version="1" comment="php5-shmop is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051480" version="1" comment="php5-snmp is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051481" version="1" comment="php5-soap is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051482" version="1" comment="php5-sockets is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051483" version="1" comment="php5-sqlite is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051484" version="1" comment="php5-suhosin is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051485" version="1" comment="php5-sysvmsg is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051486" version="1" comment="php5-sysvsem is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051487" version="1" comment="php5-sysvshm is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051488" version="1" comment="php5-tidy is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051489" version="1" comment="php5-tokenizer is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051490" version="1" comment="php5-wddx is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051491" version="1" comment="php5-xmlreader is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051492" version="1" comment="php5-xmlrpc is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051493" version="1" comment="php5-xmlwriter is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051494" version="1" comment="php5-xsl is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051495" version="1" comment="php5-zip is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051496" version="1" comment="php5-zlib is &lt;5.2.6-49.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051547" version="1" comment="phpPgAdmin is &lt;4.2-1.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051548" version="1" comment="rsyslog is &lt;3.18.3-4.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051549" version="1" comment="rsyslog is &lt;3.18.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058185" version="1" comment="apache2-mod_php5 is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058186" version="1" comment="php5-bcmath is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058187" version="1" comment="php5-bz2 is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058188" version="1" comment="php5-calendar is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058189" version="1" comment="php5-ctype is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058190" version="1" comment="php5-curl is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058191" version="1" comment="php5-dba is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058192" version="1" comment="php5-dbase is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058193" version="1" comment="php5-devel is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058194" version="1" comment="php5-dom is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058195" version="1" comment="php5-exif is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058196" version="1" comment="php5-fastcgi is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058197" version="1" comment="php5-ftp is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058198" version="1" comment="php5-gd is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058199" version="1" comment="php5-gettext is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058200" version="1" comment="php5-gmp is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058201" version="1" comment="php5-hash is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058202" version="1" comment="php5-iconv is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058203" version="1" comment="php5-imap is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058204" version="1" comment="php5-json is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058205" version="1" comment="php5-ldap is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058206" version="1" comment="php5-mbstring is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058207" version="1" comment="php5-mcrypt is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058208" version="1" comment="php5-mysql is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058209" version="1" comment="php5-ncurses is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058210" version="1" comment="php5-odbc is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058211" version="1" comment="php5-openssl is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058212" version="1" comment="php5-pcntl is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058213" version="1" comment="php5-pdo is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058214" version="1" comment="php5-pear is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058215" version="1" comment="php5-pgsql is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058216" version="1" comment="php5-posix is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058217" version="1" comment="php5-pspell is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058218" version="1" comment="php5-readline is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058219" version="1" comment="php5-shmop is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058220" version="1" comment="php5-snmp is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058221" version="1" comment="php5-soap is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058222" version="1" comment="php5-sockets is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058223" version="1" comment="php5-sqlite is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058224" version="1" comment="php5-suhosin is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058225" version="1" comment="php5-sysvmsg is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058226" version="1" comment="php5-sysvsem is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058227" version="1" comment="php5-sysvshm is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058228" version="1" comment="php5-tidy is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058229" version="1" comment="php5-tokenizer is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058230" version="1" comment="php5-wddx is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058231" version="1" comment="php5-xmlreader is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058232" version="1" comment="php5-xmlrpc is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058233" version="1" comment="php5-xmlwriter is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058234" version="1" comment="php5-xsl is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058235" version="1" comment="php5-zip is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058236" version="1" comment="php5-zlib is &lt;5.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051551" version="1" comment="vinagre is &lt;2.24.1-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036272" version="1" comment="opera is &lt;9.63-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051554" version="1" comment="netatalk-devel is &lt;2.0.3-246.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051555" version="1" comment="netatalk is &lt;2.0.3-246.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051568" version="1" comment="audiofile-32bit is &lt;0.2.6-140.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051569" version="1" comment="audiofile-64bit is &lt;0.2.6-140.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051570" version="1" comment="audiofile-devel is &lt;0.2.6-140.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051571" version="1" comment="audiofile is &lt;0.2.6-140.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051572" version="1" comment="xrdp is &lt;0.4.1-16.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051573" version="1" comment="xrdp is &lt;0.4.1-16.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051581" version="1" comment="libpng-devel-32bit is &lt;1.2.31-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051582" version="1" comment="libpng-devel-64bit is &lt;1.2.31-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051583" version="1" comment="libpng-devel is &lt;1.2.31-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051584" version="1" comment="libpng12-0-32bit is &lt;1.2.31-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051585" version="1" comment="libpng12-0-64bit is &lt;1.2.31-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051586" version="1" comment="libpng12-0 is &lt;1.2.31-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051587" version="1" comment="libpng3 is &lt;1.2.31-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061221" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.10-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061222" version="1" comment="MozillaFirefox-translations-common is &lt;3.5.10-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061223" version="1" comment="MozillaFirefox-translations-other is &lt;3.5.10-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061224" version="1" comment="MozillaFirefox is &lt;3.5.10-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061225" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.10-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061226" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.10-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061227" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.10-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061228" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.10-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061229" version="1" comment="mozilla-xulrunner191-translations-common is &lt;1.9.1.10-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061230" version="1" comment="mozilla-xulrunner191-translations-other is &lt;1.9.1.10-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061231" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.10-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061232" version="1" comment="python-xpcom191 is &lt;1.9.1.10-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051603" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051604" version="1" comment="libsnmp15-64bit is &lt;5.4.2.1-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051605" version="1" comment="libsnmp15 is &lt;5.4.2.1-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051606" version="1" comment="net-snmp-devel is &lt;5.4.2.1-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051607" version="1" comment="net-snmp is &lt;5.4.2.1-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051608" version="1" comment="perl-SNMP is &lt;5.4.2.1-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051609" version="1" comment="snmp-mibs is &lt;5.4.2.1-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051618" version="1" comment="psi is &lt;0.12-28.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059201" version="1" comment="compiz-fusion-plugins-main-devel is &lt;0.7.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059202" version="1" comment="compiz-fusion-plugins-main is &lt;0.7.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051620" version="1" comment="clamav-db is &lt;0.95-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032190" version="1" comment="clamav is &lt;0.95-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054846" version="1" comment="silc-toolkit-devel is &lt;1.1.7-7.66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054847" version="1" comment="silc-toolkit is &lt;1.1.7-7.66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060105" version="1" comment="libmysqlclient-devel is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060106" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060107" version="1" comment="libmysqlclient15-64bit is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060108" version="1" comment="libmysqlclient15 is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060109" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060110" version="1" comment="libmysqlclient_r15-64bit is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060111" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060112" version="1" comment="mysql-Max is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060113" version="1" comment="mysql-bench is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060114" version="1" comment="mysql-client is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060115" version="1" comment="mysql-debug is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060116" version="1" comment="mysql-test is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060117" version="1" comment="mysql-tools is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060118" version="1" comment="mysql is &lt;5.0.67-12.17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060119" version="1" comment="libmysqlclient-devel is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060120" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060121" version="1" comment="libmysqlclient15-64bit is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060122" version="1" comment="libmysqlclient15 is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060123" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060124" version="1" comment="libmysqlclient_r15-64bit is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060125" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060126" version="1" comment="mysql-Max is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060127" version="1" comment="mysql-bench is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060128" version="1" comment="mysql-client is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060129" version="1" comment="mysql-debug is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060130" version="1" comment="mysql-test is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060131" version="1" comment="mysql-tools is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060132" version="1" comment="mysql is &lt;5.0.67-12.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058550" version="1" comment="rubygem-actionpack-2_1 is &lt;2.1.1-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058551" version="1" comment="rubygem-actionpack is &lt;2.1.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051625" version="1" comment="ntp-doc is &lt;4.2.4p5-15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051626" version="1" comment="ntp is &lt;4.2.4p5-15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053421" version="1" comment="libapr-util1-dbd-mysql is &lt;1.3.4-13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053422" version="1" comment="libapr-util1-dbd-pgsql is &lt;1.3.4-13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053423" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053424" version="1" comment="libapr-util1-devel is &lt;1.3.4-13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053425" version="1" comment="libapr-util1 is &lt;1.3.4-13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051636" version="1" comment="bind-chrootenv is &lt;9.5.0P2-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051637" version="1" comment="bind-devel is &lt;9.5.0P2-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051638" version="1" comment="bind-doc is &lt;9.5.0P2-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051639" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051640" version="1" comment="bind-libs-64bit is &lt;9.5.0P2-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051641" version="1" comment="bind-libs is &lt;9.5.0P2-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051642" version="1" comment="bind-utils is &lt;9.5.0P2-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051643" version="1" comment="bind is &lt;9.5.0P2-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051687" version="1" comment="sudo is &lt;1.6.9p17-10.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051693" version="1" comment="curl is &lt;7.19.0-11.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051694" version="1" comment="libcurl-devel is &lt;7.19.0-11.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051695" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051696" version="1" comment="libcurl4-64bit is &lt;7.19.0-11.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051697" version="1" comment="libcurl4 is &lt;7.19.0-11.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051722" version="1" comment="libpng-devel-32bit is &lt;1.2.31-4.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051723" version="1" comment="libpng-devel-64bit is &lt;1.2.31-4.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051724" version="1" comment="libpng-devel is &lt;1.2.31-4.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051725" version="1" comment="libpng12-0-32bit is &lt;1.2.31-4.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051726" version="1" comment="libpng12-0-64bit is &lt;1.2.31-4.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051727" version="1" comment="libpng12-0 is &lt;1.2.31-4.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051728" version="1" comment="libpng3 is &lt;1.2.31-4.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051741" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.7-1.1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051742" version="1" comment="MozillaFirefox-translations is &lt;3.0.7-1.1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051743" version="1" comment="MozillaFirefox is &lt;3.0.7-1.1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051744" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.7-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051745" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.7-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051746" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.7-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051747" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.7-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051748" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.7-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051749" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.7-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051750" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.7-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051751" version="1" comment="python-xpcom190 is &lt;1.9.0.7-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051759" version="1" comment="libpng-devel-32bit is &lt;1.2.31-4.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051760" version="1" comment="libpng-devel-64bit is &lt;1.2.31-4.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051761" version="1" comment="libpng-devel is &lt;1.2.31-4.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051762" version="1" comment="libpng12-0-32bit is &lt;1.2.31-4.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051763" version="1" comment="libpng12-0-64bit is &lt;1.2.31-4.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051764" version="1" comment="libpng12-0 is &lt;1.2.31-4.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051765" version="1" comment="libpng3 is &lt;1.2.31-4.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051780" version="1" comment="seamonkey-dom-inspector is &lt;1.1.16-1.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051781" version="1" comment="seamonkey-irc is &lt;1.1.16-1.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051782" version="1" comment="seamonkey-mail is &lt;1.1.16-1.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051783" version="1" comment="seamonkey-spellchecker is &lt;1.1.16-1.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051784" version="1" comment="seamonkey-venkman is &lt;1.1.16-1.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051785" version="1" comment="seamonkey is &lt;1.1.16-1.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051787" version="1" comment="eID-belgium is &lt;2.6.0-121.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051790" version="1" comment="flash-player is &lt;10.0.22.87-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051795" version="1" comment="kpartx is &lt;0.4.8-26.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051796" version="1" comment="multipath-tools is &lt;0.4.8-26.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051799" version="1" comment="boinc-client-devel is &lt;6.2.18-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051800" version="1" comment="boinc-client is &lt;6.2.18-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051801" version="1" comment="boinc-gui-lang is &lt;6.2.18-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051802" version="1" comment="boinc-gui is &lt;6.2.18-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051808" version="1" comment="amarok-lang is &lt;1.4.10-26.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051809" version="1" comment="amarok-libvisual is &lt;1.4.10-26.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051810" version="1" comment="amarok-xine is &lt;1.4.10-26.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051811" version="1" comment="amarok-yauap is &lt;1.4.10-26.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051812" version="1" comment="amarok is &lt;1.4.10-26.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051818" version="1" comment="libpoppler4 is &lt;0.10.1-1.6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051830" version="1" comment="kdegraphics3-3D is &lt;3.5.10-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051831" version="1" comment="kdegraphics3-devel is &lt;3.5.10-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051832" version="1" comment="kdegraphics3-extra is &lt;3.5.10-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051833" version="1" comment="kdegraphics3-fax is &lt;3.5.10-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051834" version="1" comment="kdegraphics3-imaging is &lt;3.5.10-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051835" version="1" comment="kdegraphics3-kamera is &lt;3.5.10-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051836" version="1" comment="kdegraphics3-pdf is &lt;3.5.10-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051837" version="1" comment="kdegraphics3-postscript is &lt;3.5.10-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051838" version="1" comment="kdegraphics3-scan is &lt;3.5.10-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051839" version="1" comment="kdegraphics3-tex is &lt;3.5.10-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051840" version="1" comment="kdegraphics3 is &lt;3.5.10-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051854" version="1" comment="xpdf-tools is &lt;3.02-97.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051855" version="1" comment="xpdf is &lt;3.02-97.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053874" version="1" comment="icu-data is &lt;4.0-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053875" version="1" comment="icu is &lt;4.0-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053876" version="1" comment="libicu-32bit is &lt;4.0-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053877" version="1" comment="libicu-64bit is &lt;4.0-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053878" version="1" comment="libicu-devel-32bit is &lt;4.0-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053879" version="1" comment="libicu-devel-64bit is &lt;4.0-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053880" version="1" comment="libicu-devel is &lt;4.0-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053881" version="1" comment="libicu-doc is &lt;4.0-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053882" version="1" comment="libicu is &lt;4.0-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051872" version="1" comment="ntp-doc is &lt;4.2.4p6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051873" version="1" comment="ntp is &lt;4.2.4p6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051880" version="1" comment="cups-client is &lt;1.3.9-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051881" version="1" comment="cups-devel is &lt;1.3.9-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051882" version="1" comment="cups-libs-32bit is &lt;1.3.9-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051883" version="1" comment="cups-libs-64bit is &lt;1.3.9-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051884" version="1" comment="cups-libs is &lt;1.3.9-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051885" version="1" comment="cups is &lt;1.3.9-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051893" version="1" comment="libsndfile-32bit is &lt;1.0.17-171.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051894" version="1" comment="libsndfile-64bit is &lt;1.0.17-171.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051895" version="1" comment="libsndfile-devel is &lt;1.0.17-171.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051896" version="1" comment="libsndfile-octave is &lt;1.0.17-171.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051897" version="1" comment="libsndfile-progs is &lt;1.0.17-171.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051898" version="1" comment="libsndfile is &lt;1.0.17-171.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051905" version="1" comment="acroread is &lt;8.1.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051914" version="1" comment="acroread is &lt;8.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054593" version="1" comment="OpenOffice_org-math is &lt;3.0.0.9-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054594" version="1" comment="OpenOffice_org-writer-devel is &lt;3.0.0.9-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054595" version="1" comment="OpenOffice_org-writer-l10n-prebuilt is &lt;3.0.0.9-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054596" version="1" comment="OpenOffice_org-writer is &lt;3.0.0.9-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058871" version="1" comment="OpenOffice_org-base-drivers-postgresql is &lt;3.0.0.9-1.11.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058872" version="1" comment="OpenOffice_org-gnome is &lt;3.0.0.9-1.11.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058873" version="1" comment="OpenOffice_org-kde is &lt;3.0.0.9-1.11.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058874" version="1" comment="OpenOffice_org-libs-core-devel is &lt;3.0.0.9-1.11.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058875" version="1" comment="OpenOffice_org-libs-core-l10n-prebuilt is &lt;3.0.0.9-1.11.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058876" version="1" comment="OpenOffice_org-libs-core is &lt;3.0.0.9-1.11.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058877" version="1" comment="OpenOffice_org-libs-extern-devel is &lt;3.0.0.9-1.15.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058878" version="1" comment="OpenOffice_org-libs-extern-l10n-prebuilt is &lt;3.0.0.9-1.15.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058879" version="1" comment="OpenOffice_org-libs-extern is &lt;3.0.0.9-1.15.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058880" version="1" comment="OpenOffice_org-libs-gui-devel is &lt;3.0.0.9-1.12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058881" version="1" comment="OpenOffice_org-libs-gui-l10n-prebuilt is &lt;3.0.0.9-1.12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058882" version="1" comment="OpenOffice_org-libs-gui is &lt;3.0.0.9-1.12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058883" version="1" comment="OpenOffice_org-mailmerge is &lt;3.0.0.9-1.11.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058884" version="1" comment="OpenOffice_org-math is &lt;3.0.0.9-2.9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058885" version="1" comment="OpenOffice_org-writer-devel is &lt;3.0.0.9-2.9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058886" version="1" comment="OpenOffice_org-writer-l10n-prebuilt is &lt;3.0.0.9-2.9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058887" version="1" comment="OpenOffice_org-writer is &lt;3.0.0.9-2.9.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054457" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.5.1_b16-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054458" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.5.1_b16-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054459" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.5.1_b16-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054460" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.5.1_b16-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054461" version="1" comment="java-1_6_0-openjdk-src is &lt;1.5.1_b16-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054462" version="1" comment="java-1_6_0-openjdk is &lt;1.5.1_b16-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051920" version="1" comment="ganglia-monitor-core-devel is &lt;2.5.7-172.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051921" version="1" comment="ganglia-monitor-core-gmetad is &lt;2.5.7-172.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051922" version="1" comment="ganglia-monitor-core-gmond is &lt;2.5.7-172.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051923" version="1" comment="ganglia-monitor-core is &lt;2.5.7-172.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051924" version="1" comment="ganglia-webfrontend is &lt;2.5.7-172.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051929" version="1" comment="wine-devel is &lt;1.1.9-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051930" version="1" comment="wine is &lt;1.1.9-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051943" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051944" version="1" comment="MozillaFirefox-translations is &lt;3.0.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051945" version="1" comment="MozillaFirefox is &lt;3.0.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051946" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051947" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051948" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051949" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051950" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051951" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051952" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051953" version="1" comment="python-xpcom190 is &lt;1.9.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051955" version="1" comment="NetworkManager-devel is &lt;0.7.0.r4359-15.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051956" version="1" comment="NetworkManager-doc is &lt;0.7.0.r4359-15.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051957" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051958" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051966" version="1" comment="NetworkManager-gnome is &lt;0.7.0.r1053-11.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051971" version="1" comment="ModemManager is &lt;0.1_20081203-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051972" version="1" comment="NetworkManager-devel is &lt;0.7.0.r4359-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051973" version="1" comment="NetworkManager-doc is &lt;0.7.0.r4359-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051974" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051975" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051980" version="1" comment="NetworkManager-kde-devel is &lt;0.7r848570-23.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051981" version="1" comment="NetworkManager-kde is &lt;0.7r848570-23.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051982" version="1" comment="NetworkManager-openvpn-kde is &lt;0.7r848570-23.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051983" version="1" comment="NetworkManager-vpnc-kde is &lt;0.7r848570-23.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051984" version="1" comment="cnetworkmanager is &lt;0.8.0.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051992" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051993" version="1" comment="libopensc2-64bit is &lt;0.11.6-5.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051994" version="1" comment="libopensc2 is &lt;0.11.6-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051995" version="1" comment="opensc-32bit is &lt;0.11.6-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051996" version="1" comment="opensc-64bit is &lt;0.11.6-5.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051997" version="1" comment="opensc-devel is &lt;0.11.6-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051998" version="1" comment="opensc is &lt;0.11.6-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052009" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.10-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052010" version="1" comment="gstreamer-0_10-plugins-good-extra is &lt;0.10.10-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052011" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.10-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052012" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.10-3.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052014" version="1" comment="sblim-sfcb is &lt;1.3.2-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052015" version="1" comment="squid is &lt;2.7.STABLE5-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052017" version="1" comment="audacity is &lt;1.3.5-49.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052073" version="1" comment="moodle-af is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052074" version="1" comment="moodle-ar is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052075" version="1" comment="moodle-be is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052076" version="1" comment="moodle-bg is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052077" version="1" comment="moodle-bs is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052078" version="1" comment="moodle-ca is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052079" version="1" comment="moodle-cs is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052080" version="1" comment="moodle-da is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052081" version="1" comment="moodle-de is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052082" version="1" comment="moodle-de_du is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052083" version="1" comment="moodle-el is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052084" version="1" comment="moodle-es is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052085" version="1" comment="moodle-et is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052086" version="1" comment="moodle-eu is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052087" version="1" comment="moodle-fa is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052088" version="1" comment="moodle-fi is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052089" version="1" comment="moodle-fr is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052090" version="1" comment="moodle-ga is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052091" version="1" comment="moodle-gl is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052092" version="1" comment="moodle-he is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052093" version="1" comment="moodle-hi is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052094" version="1" comment="moodle-hr is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052095" version="1" comment="moodle-hu is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052096" version="1" comment="moodle-id is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052097" version="1" comment="moodle-is is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052098" version="1" comment="moodle-it is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052099" version="1" comment="moodle-ja is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052100" version="1" comment="moodle-ka is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052101" version="1" comment="moodle-km is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052102" version="1" comment="moodle-kn is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052103" version="1" comment="moodle-ko is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052104" version="1" comment="moodle-lt is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052105" version="1" comment="moodle-lv is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052106" version="1" comment="moodle-mi_tn is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052107" version="1" comment="moodle-ms is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052108" version="1" comment="moodle-nl is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052109" version="1" comment="moodle-nn is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052110" version="1" comment="moodle-no is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052111" version="1" comment="moodle-pl is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052112" version="1" comment="moodle-pt is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052113" version="1" comment="moodle-ro is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052114" version="1" comment="moodle-ru is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052115" version="1" comment="moodle-sk is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052116" version="1" comment="moodle-sl is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052117" version="1" comment="moodle-so is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052118" version="1" comment="moodle-sq is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052119" version="1" comment="moodle-sr is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052120" version="1" comment="moodle-sv is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052121" version="1" comment="moodle-th is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052122" version="1" comment="moodle-tl is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052123" version="1" comment="moodle-tr is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052124" version="1" comment="moodle-uk is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052125" version="1" comment="moodle-vi is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052126" version="1" comment="moodle-zh_cn is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052127" version="1" comment="moodle is &lt;1.9.3-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052130" version="1" comment="python-crypto is &lt;2.0.1-28.115.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052138" version="1" comment="lcms is &lt;1.17-44.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052139" version="1" comment="liblcms-devel-32bit is &lt;1.17-44.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052140" version="1" comment="liblcms-devel-64bit is &lt;1.17-44.59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052141" version="1" comment="liblcms-devel is &lt;1.17-44.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052142" version="1" comment="liblcms1-32bit is &lt;1.17-44.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052143" version="1" comment="liblcms1-64bit is &lt;1.17-44.59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052144" version="1" comment="liblcms1 is &lt;1.17-44.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052145" version="1" comment="python-lcms is &lt;1.17-44.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052159" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.4_b14-24.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052160" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.4_b14-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052161" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.4_b14-24.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052162" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.4_b14-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052163" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.4_b14-24.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052164" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.4_b14-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052165" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.4_b14-24.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052166" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.4_b14-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052167" version="1" comment="java-1_6_0-openjdk-src is &lt;1.4_b14-24.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052168" version="1" comment="java-1_6_0-openjdk-src is &lt;1.4_b14-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052169" version="1" comment="java-1_6_0-openjdk is &lt;1.4_b14-24.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052170" version="1" comment="java-1_6_0-openjdk is &lt;1.4_b14-24.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052174" version="1" comment="evolution-data-server-32bit is &lt;2.24.1.1-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052175" version="1" comment="evolution-data-server-devel is &lt;2.24.1.1-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052176" version="1" comment="evolution-data-server-doc is &lt;2.24.1.1-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052177" version="1" comment="evolution-data-server-lang is &lt;2.24.1.1-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052178" version="1" comment="evolution-data-server is &lt;2.24.1.1-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052179" version="1" comment="evolution-devel is &lt;2.24.1.1-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052180" version="1" comment="evolution-lang is &lt;2.24.1.1-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052181" version="1" comment="evolution-mono-providers is &lt;0.1.1-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052182" version="1" comment="evolution-pilot is &lt;2.24.1.1-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052183" version="1" comment="evolution is &lt;2.24.1.1-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052184" version="1" comment="gtkhtml2-devel is &lt;3.24.1.1-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052185" version="1" comment="gtkhtml2-lang is &lt;3.24.1.1-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052186" version="1" comment="gtkhtml2 is &lt;3.24.1.1-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052213" version="1" comment="ghostscript-devel is &lt;8.62-31.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052214" version="1" comment="ghostscript-fonts-other is &lt;8.62-31.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052215" version="1" comment="ghostscript-fonts-rus is &lt;8.62-31.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052216" version="1" comment="ghostscript-fonts-std is &lt;8.62-31.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052217" version="1" comment="ghostscript-ijs-devel is &lt;8.62-31.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052218" version="1" comment="ghostscript-library is &lt;8.62-31.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052219" version="1" comment="ghostscript-omni is &lt;8.62-31.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052220" version="1" comment="ghostscript-x11 is &lt;8.62-31.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052221" version="1" comment="libgimpprint-devel is &lt;4.2.7-31.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052222" version="1" comment="libgimpprint is &lt;4.2.7-31.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052241" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.21-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052242" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.21-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052243" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.21-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052244" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.21-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052245" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.21-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052246" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.21-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052247" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.21-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052249" version="1" comment="libopenssl-devel is &lt;0.9.8h-28.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052250" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-28.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052251" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8h-28.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052252" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-28.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052253" version="1" comment="openssl-doc is &lt;0.9.8h-28.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052254" version="1" comment="openssl is &lt;0.9.8h-28.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052280" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052281" version="1" comment="compat-openssl097g-64bit is &lt;0.9.7g-146.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052282" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052285" version="1" comment="wireshark-devel is &lt;1.0.4-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052286" version="1" comment="wireshark is &lt;1.0.4-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032269" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052297" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052298" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032270" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052299" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032271" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032273" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052300" version="1" comment="python-xpcom190 is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052303" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032267" version="1" comment="MozillaFirefox-translations is &lt;3.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032268" version="1" comment="MozillaFirefox is &lt;3.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052307" version="1" comment="kernel-debug-base is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052308" version="1" comment="kernel-debug-extra is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052309" version="1" comment="kernel-debug is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032276" version="1" comment="kernel-default-base is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052310" version="1" comment="kernel-default-extra is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032277" version="1" comment="kernel-default is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052311" version="1" comment="kernel-docs is &lt;2.6.3-3.13.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032278" version="1" comment="kernel-kdump is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032289" version="1" comment="kernel-pae-base is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052312" version="1" comment="kernel-pae-extra is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032290" version="1" comment="kernel-pae is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032279" version="1" comment="kernel-ppc64-base is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052313" version="1" comment="kernel-ppc64-extra is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032280" version="1" comment="kernel-ppc64 is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052314" version="1" comment="kernel-ps3 is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032281" version="1" comment="kernel-source is &lt;2.6.27.21-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052315" version="1" comment="kernel-syms is &lt;2.6.27.21-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052316" version="1" comment="kernel-trace-base is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052317" version="1" comment="kernel-trace-extra is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052318" version="1" comment="kernel-trace is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052319" version="1" comment="kernel-vanilla is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032285" version="1" comment="kernel-xen-base is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052320" version="1" comment="kernel-xen-extra is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032286" version="1" comment="kernel-xen is &lt;2.6.27.21-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052355" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052356" version="1" comment="cyrus-sasl-64bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052357" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052358" version="1" comment="cyrus-sasl-crammd5-64bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052359" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052360" version="1" comment="cyrus-sasl-devel-32bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052361" version="1" comment="cyrus-sasl-devel-64bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052362" version="1" comment="cyrus-sasl-devel is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052363" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052364" version="1" comment="cyrus-sasl-digestmd5-64bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052365" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052366" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052367" version="1" comment="cyrus-sasl-gssapi-64bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052368" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052369" version="1" comment="cyrus-sasl-ntlm is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052370" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052371" version="1" comment="cyrus-sasl-otp-64bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052372" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052373" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052374" version="1" comment="cyrus-sasl-plain-64bit is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052375" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052376" version="1" comment="cyrus-sasl is &lt;2.1.22-182.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056047" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056048" version="1" comment="MozillaFirefox-translations is &lt;3.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056049" version="1" comment="MozillaFirefox is &lt;3.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055940" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055952" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055953" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055941" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055955" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055942" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055944" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056050" version="1" comment="python-xpcom190 is &lt;1.9.0.15-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059214" version="1" comment="MozillaThunderbird-devel is &lt;2.0.0.24-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059215" version="1" comment="MozillaThunderbird-translations is &lt;2.0.0.24-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059216" version="1" comment="MozillaThunderbird is &lt;2.0.0.24-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056374" version="1" comment="opera is &lt;10.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060701" version="1" comment="seamonkey-dom-inspector is &lt;1.1.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060702" version="1" comment="seamonkey-irc is &lt;1.1.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060703" version="1" comment="seamonkey-mail is &lt;1.1.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060704" version="1" comment="seamonkey-spellchecker is &lt;1.1.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060705" version="1" comment="seamonkey-venkman is &lt;1.1.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060706" version="1" comment="seamonkey is &lt;1.1.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056648" version="1" comment="kdelibs3-32bit is &lt;3.5.10-21.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056649" version="1" comment="kdelibs3-64bit is &lt;3.5.10-21.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056650" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.10-21.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056651" version="1" comment="kdelibs3-arts-64bit is &lt;3.5.10-21.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056652" version="1" comment="kdelibs3-arts is &lt;3.5.10-21.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056653" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-21.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056654" version="1" comment="kdelibs3-default-style-64bit is &lt;3.5.10-21.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056655" version="1" comment="kdelibs3-default-style is &lt;3.5.10-21.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056656" version="1" comment="kdelibs3-devel is &lt;3.5.10-21.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056657" version="1" comment="kdelibs3-doc is &lt;3.5.10-21.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056658" version="1" comment="kdelibs3 is &lt;3.5.10-21.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056659" version="1" comment="kdelibs4-core is &lt;4.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056660" version="1" comment="kdelibs4-doc is &lt;4.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056661" version="1" comment="kdelibs4 is &lt;4.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056662" version="1" comment="libkde4-32bit is &lt;4.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056663" version="1" comment="libkde4-devel is &lt;4.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056664" version="1" comment="libkde4 is &lt;4.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056665" version="1" comment="libkdecore4-32bit is &lt;4.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056666" version="1" comment="libkdecore4-devel is &lt;4.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056667" version="1" comment="libkdecore4 is &lt;4.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056668" version="1" comment="utempter-32bit is &lt;0.5.5-105.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056669" version="1" comment="utempter-64bit is &lt;0.5.5-105.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056670" version="1" comment="utempter is &lt;0.5.5-105.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056671" version="1" comment="utempter is &lt;0.5.5-105.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056672" version="1" comment="utempter is &lt;0.5.5-105.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056065" version="1" comment="mozilla-nspr-32bit is &lt;4.8.2-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056079" version="1" comment="mozilla-nspr-64bit is &lt;4.8.2-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056080" version="1" comment="mozilla-nspr-devel is &lt;4.8.2-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056067" version="1" comment="mozilla-nspr is &lt;4.8.2-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053431" version="1" comment="dhcp-client is &lt;3.1.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053432" version="1" comment="dhcp-devel is &lt;3.1.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053433" version="1" comment="dhcp-relay is &lt;3.1.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053434" version="1" comment="dhcp-server is &lt;3.1.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053435" version="1" comment="dhcp is &lt;3.1.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053654" version="1" comment="bind-chrootenv is &lt;9.5.0P2-18.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053655" version="1" comment="bind-devel is &lt;9.5.0P2-18.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053656" version="1" comment="bind-doc is &lt;9.5.0P2-18.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053657" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-18.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053658" version="1" comment="bind-libs-64bit is &lt;9.5.0P2-18.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053659" version="1" comment="bind-libs is &lt;9.5.0P2-18.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053660" version="1" comment="bind-utils is &lt;9.5.0P2-18.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053661" version="1" comment="bind is &lt;9.5.0P2-18.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052402" version="1" comment="libxine-devel is &lt;1.1.15-23.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052403" version="1" comment="libxine1-32bit is &lt;1.1.15-23.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052404" version="1" comment="libxine1-gnome-vfs is &lt;1.1.15-23.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052405" version="1" comment="libxine1-pulse is &lt;1.1.15-23.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052406" version="1" comment="libxine1 is &lt;1.1.15-23.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052413" version="1" comment="optipng is &lt;0.6.1-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057589" version="1" comment="avahi-compat-howl-devel is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057590" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057591" version="1" comment="avahi-lang is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057592" version="1" comment="avahi-utils is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057593" version="1" comment="avahi is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057594" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057595" version="1" comment="libavahi-client3-64bit is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057596" version="1" comment="libavahi-client3 is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057597" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057598" version="1" comment="libavahi-common3-64bit is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057599" version="1" comment="libavahi-common3 is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057600" version="1" comment="libavahi-core5 is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057601" version="1" comment="libavahi-devel is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057602" version="1" comment="libavahi-glib-devel is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057603" version="1" comment="libavahi-glib1-32bit is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057604" version="1" comment="libavahi-glib1-64bit is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057605" version="1" comment="libavahi-glib1 is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057606" version="1" comment="libavahi-gobject-devel is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057607" version="1" comment="libavahi-gobject0 is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057608" version="1" comment="libavahi-ui0 is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057609" version="1" comment="libdns_sd-32bit is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057610" version="1" comment="libdns_sd-64bit is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057611" version="1" comment="libdns_sd is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057612" version="1" comment="libhowl0 is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057613" version="1" comment="python-avahi is &lt;0.6.23-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052416" version="1" comment="strongswan-doc is &lt;4.2.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052417" version="1" comment="strongswan is &lt;4.2.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052421" version="1" comment="openswan-doc is &lt;2.6.16-1.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052422" version="1" comment="openswan is &lt;2.6.16-1.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057056" version="1" comment="libpoppler-devel is &lt;0.10.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057057" version="1" comment="libpoppler-doc is &lt;0.10.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057058" version="1" comment="libpoppler-glib-devel is &lt;0.10.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057059" version="1" comment="libpoppler-glib4 is &lt;0.10.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057060" version="1" comment="libpoppler-qt2 is &lt;0.10.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057061" version="1" comment="libpoppler-qt3-devel is &lt;0.10.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057062" version="1" comment="libpoppler-qt4-3 is &lt;0.10.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057063" version="1" comment="libpoppler-qt4-devel is &lt;0.10.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057064" version="1" comment="libpoppler4 is &lt;0.10.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057065" version="1" comment="poppler-tools is &lt;0.10.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054172" version="1" comment="xpdf-tools is &lt;3.02-97.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054173" version="1" comment="xpdf is &lt;3.02-97.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052432" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.4_b14-24.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052433" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.4_b14-24.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052434" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.4_b14-24.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052435" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.4_b14-24.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052436" version="1" comment="java-1_6_0-openjdk-src is &lt;1.4_b14-24.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052437" version="1" comment="java-1_6_0-openjdk is &lt;1.4_b14-24.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052463" version="1" comment="krb5-32bit is &lt;1.6.3-132.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052464" version="1" comment="krb5-64bit is &lt;1.6.3-132.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052465" version="1" comment="krb5-apps-clients is &lt;1.6.3-132.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052466" version="1" comment="krb5-apps-servers is &lt;1.6.3-132.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052467" version="1" comment="krb5-client is &lt;1.6.3-132.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052468" version="1" comment="krb5-devel-32bit is &lt;1.6.3-132.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052469" version="1" comment="krb5-devel-64bit is &lt;1.6.3-132.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052470" version="1" comment="krb5-devel is &lt;1.6.3-132.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052471" version="1" comment="krb5-server is &lt;1.6.3-132.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052472" version="1" comment="krb5 is &lt;1.6.3-132.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052492" version="1" comment="gtk2-32bit is &lt;2.14.4-8.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052493" version="1" comment="gtk2-64bit is &lt;2.14.4-8.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052494" version="1" comment="gtk2-branding-upstream is &lt;2.14.4-8.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052495" version="1" comment="gtk2-devel is &lt;2.14.4-8.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052496" version="1" comment="gtk2-doc is &lt;2.14.4-8.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052497" version="1" comment="gtk2-lang is &lt;2.14.4-8.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052498" version="1" comment="gtk2 is &lt;2.14.4-8.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053711" version="1" comment="flash-player is &lt;10.0.32.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052499" version="1" comment="opera is &lt;9.64-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032320" version="1" comment="postgresql-contrib is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052517" version="1" comment="postgresql-devel is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032321" version="1" comment="postgresql-docs is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032322" version="1" comment="postgresql-libs-32bit is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052518" version="1" comment="postgresql-libs-64bit is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032324" version="1" comment="postgresql-libs is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032325" version="1" comment="postgresql-server is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032326" version="1" comment="postgresql is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056178" version="1" comment="libqt4-32bit is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056179" version="1" comment="libqt4-64bit is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056180" version="1" comment="libqt4-devel is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056181" version="1" comment="libqt4-qt3support-32bit is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056182" version="1" comment="libqt4-qt3support-64bit is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056183" version="1" comment="libqt4-qt3support is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056184" version="1" comment="libqt4-sql-32bit is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056185" version="1" comment="libqt4-sql-64bit is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056186" version="1" comment="libqt4-sql-sqlite is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056187" version="1" comment="libqt4-sql is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056188" version="1" comment="libqt4-x11-32bit is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056189" version="1" comment="libqt4-x11-64bit is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056190" version="1" comment="libqt4-x11 is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056191" version="1" comment="libqt4 is &lt;4.4.3-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064891" version="1" comment="kdegraphics3-3D is &lt;3.5.10-1.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064892" version="1" comment="kdegraphics3-devel is &lt;3.5.10-1.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064893" version="1" comment="kdegraphics3-extra is &lt;3.5.10-1.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064894" version="1" comment="kdegraphics3-fax is &lt;3.5.10-1.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064895" version="1" comment="kdegraphics3-imaging is &lt;3.5.10-1.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064896" version="1" comment="kdegraphics3-kamera is &lt;3.5.10-1.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064897" version="1" comment="kdegraphics3-pdf is &lt;3.5.10-1.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064898" version="1" comment="kdegraphics3-postscript is &lt;3.5.10-1.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064899" version="1" comment="kdegraphics3-scan is &lt;3.5.10-1.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064900" version="1" comment="kdegraphics3-tex is &lt;3.5.10-1.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064901" version="1" comment="kdegraphics3 is &lt;3.5.10-1.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052527" version="1" comment="freetype2-32bit is &lt;2.3.7-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052528" version="1" comment="freetype2-64bit is &lt;2.3.7-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052529" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052530" version="1" comment="freetype2-devel-64bit is &lt;2.3.7-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052531" version="1" comment="freetype2-devel is &lt;2.3.7-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052532" version="1" comment="freetype2 is &lt;2.3.7-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052557" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032330" version="1" comment="MozillaFirefox-translations is &lt;3.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032331" version="1" comment="MozillaFirefox is &lt;3.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032332" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052540" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052541" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032333" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052543" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032334" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032336" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052558" version="1" comment="python-xpcom190 is &lt;1.9.0.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052559" version="1" comment="unbound-devel is &lt;1.0.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052560" version="1" comment="unbound is &lt;1.0.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052561" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052562" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052563" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052564" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052565" version="1" comment="java-1_5_0-sun-src is &lt;1.5.0_update18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052566" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052567" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052589" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052569" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052570" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052571" version="1" comment="java-1_6_0-sun-src is &lt;1.6.0.u13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052572" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052657" version="1" comment="moodle-af is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052658" version="1" comment="moodle-ar is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052659" version="1" comment="moodle-be is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052660" version="1" comment="moodle-bg is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052661" version="1" comment="moodle-bs is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052662" version="1" comment="moodle-ca is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052663" version="1" comment="moodle-cs is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052664" version="1" comment="moodle-da is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052665" version="1" comment="moodle-de is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052666" version="1" comment="moodle-de_du is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052667" version="1" comment="moodle-el is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052668" version="1" comment="moodle-es is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052669" version="1" comment="moodle-et is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052670" version="1" comment="moodle-eu is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052671" version="1" comment="moodle-fa is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052672" version="1" comment="moodle-fi is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052673" version="1" comment="moodle-fr is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052674" version="1" comment="moodle-ga is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052675" version="1" comment="moodle-gl is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052676" version="1" comment="moodle-he is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052677" version="1" comment="moodle-hi is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052678" version="1" comment="moodle-hr is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052679" version="1" comment="moodle-hu is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052680" version="1" comment="moodle-id is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052681" version="1" comment="moodle-is is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052682" version="1" comment="moodle-it is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052683" version="1" comment="moodle-ja is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052684" version="1" comment="moodle-ka is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052685" version="1" comment="moodle-km is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052686" version="1" comment="moodle-kn is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052687" version="1" comment="moodle-ko is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052688" version="1" comment="moodle-lt is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052689" version="1" comment="moodle-lv is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052690" version="1" comment="moodle-mi_tn is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052691" version="1" comment="moodle-ms is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052692" version="1" comment="moodle-nl is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052693" version="1" comment="moodle-nn is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052694" version="1" comment="moodle-no is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052695" version="1" comment="moodle-pl is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052696" version="1" comment="moodle-pt is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052697" version="1" comment="moodle-ro is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052698" version="1" comment="moodle-ru is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052699" version="1" comment="moodle-sk is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052700" version="1" comment="moodle-sl is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052701" version="1" comment="moodle-so is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052702" version="1" comment="moodle-sq is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052703" version="1" comment="moodle-sr is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052704" version="1" comment="moodle-sv is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052705" version="1" comment="moodle-th is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052706" version="1" comment="moodle-tl is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052707" version="1" comment="moodle-tr is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052708" version="1" comment="moodle-uk is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052709" version="1" comment="moodle-vi is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052710" version="1" comment="moodle-zh_cn is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052711" version="1" comment="moodle is &lt;1.9.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052716" version="1" comment="libudev-devel is &lt;128-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052717" version="1" comment="libudev0 is &lt;128-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052718" version="1" comment="libvolume_id-devel is &lt;128-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052719" version="1" comment="libvolume_id1 is &lt;128-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052720" version="1" comment="libvolume_id is &lt;126-17.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052721" version="1" comment="udev is &lt;128-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052726" version="1" comment="aufs-kmp-debug is &lt;cvs20081020_2.6.27.23_0.1-1.32.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052727" version="1" comment="aufs-kmp-trace is &lt;cvs20081020_2.6.27.23_0.1-1.32.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052728" version="1" comment="brocade-bfa-kmp-debug is &lt;1.1.0.2_2.6.27.23_0.1-1.7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052729" version="1" comment="brocade-bfa-kmp-trace is &lt;1.1.0.2_2.6.27.23_0.1-1.7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052730" version="1" comment="dazuko-kmp-debug is &lt;2.3.6_2.6.27.23_0.1-1.49.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052731" version="1" comment="dazuko-kmp-trace is &lt;2.3.6_2.6.27.23_0.1-1.49.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052732" version="1" comment="drbd-kmp-debug is &lt;8.2.7_2.6.27.23_0.1-1.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052733" version="1" comment="drbd-kmp-trace is &lt;8.2.7_2.6.27.23_0.1-1.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052734" version="1" comment="intel-iamt-heci-kmp-debug is &lt;3.1.0.31_2.6.27.23_0.1-2.40.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052735" version="1" comment="intel-iamt-heci-kmp-trace is &lt;3.1.0.31_2.6.27.23_0.1-2.40.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052736" version="1" comment="iscsitarget-kmp-debug is &lt;0.4.15_2.6.27.23_0.1-89.11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052737" version="1" comment="iscsitarget-kmp-trace is &lt;0.4.15_2.6.27.23_0.1-89.11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052738" version="1" comment="kernel-debug-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052739" version="1" comment="kernel-debug-extra is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052740" version="1" comment="kernel-debug is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032345" version="1" comment="kernel-default-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032339" version="1" comment="kernel-default-extra is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032346" version="1" comment="kernel-default is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052741" version="1" comment="kernel-docs is &lt;2.6.3-3.13.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032347" version="1" comment="kernel-kdump is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032356" version="1" comment="kernel-pae-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032341" version="1" comment="kernel-pae-extra is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032357" version="1" comment="kernel-pae is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032348" version="1" comment="kernel-ppc64-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032340" version="1" comment="kernel-ppc64-extra is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032349" version="1" comment="kernel-ppc64 is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052742" version="1" comment="kernel-ps3 is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032350" version="1" comment="kernel-source is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032351" version="1" comment="kernel-syms is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052743" version="1" comment="kernel-trace-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052744" version="1" comment="kernel-trace-extra is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052745" version="1" comment="kernel-trace is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052746" version="1" comment="kernel-vanilla is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032360" version="1" comment="kernel-xen-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032342" version="1" comment="kernel-xen-extra is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032361" version="1" comment="kernel-xen is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052747" version="1" comment="kqemu-kmp-debug is &lt;1.4.0pre1_2.6.27.23_0.1-2.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052748" version="1" comment="kqemu-kmp-trace is &lt;1.4.0pre1_2.6.27.23_0.1-2.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052749" version="1" comment="kvm-kmp-trace is &lt;78_2.6.27.23_0.1-6.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052750" version="1" comment="kvm-kmp-trace is &lt;78_2.6.27.23_0.1-6.6.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052751" version="1" comment="lirc-kmp-trace is &lt;0.8.4_2.6.27.23_0.1-0.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052752" version="1" comment="ofed-kmp-debug is &lt;1.4_2.6.27.23_0.1-21.15.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052753" version="1" comment="ofed-kmp-trace is &lt;1.4_2.6.27.23_0.1-21.15.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052754" version="1" comment="oracleasm-kmp-debug is &lt;2.0.5_2.6.27.23_0.1-2.36.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052755" version="1" comment="oracleasm-kmp-trace is &lt;2.0.5_2.6.27.23_0.1-2.36.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052756" version="1" comment="pcfclock-kmp-debug is &lt;0.44_2.6.27.23_0.1-227.56.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052757" version="1" comment="pcfclock-kmp-trace is &lt;0.44_2.6.27.23_0.1-227.56.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052758" version="1" comment="virtualbox-ose-kmp-debug is &lt;2.0.6_2.6.27.23_0.1-2.8.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052759" version="1" comment="virtualbox-ose-kmp-debug is &lt;2.0.6_2.6.27.23_0.1-2.8.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052760" version="1" comment="virtualbox-ose-kmp-trace is &lt;2.0.6_2.6.27.23_0.1-2.8.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052761" version="1" comment="virtualbox-ose-kmp-trace is &lt;2.0.6_2.6.27.23_0.1-2.8.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052762" version="1" comment="vmware-kmp-debug is &lt;2008.09.03_2.6.27.23_0.1-5.50.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052763" version="1" comment="vmware-kmp-trace is &lt;2008.09.03_2.6.27.23_0.1-5.50.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053613" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053589" version="1" comment="MozillaFirefox-translations is &lt;3.0.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053590" version="1" comment="MozillaFirefox is &lt;3.0.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053591" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.12-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053596" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.12-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053597" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.12-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053592" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.12-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053599" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.12-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053593" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.12-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053595" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.12-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053614" version="1" comment="python-xpcom190 is &lt;1.9.0.12-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057938" version="1" comment="pango-32bit is &lt;1.22.1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057939" version="1" comment="pango-64bit is &lt;1.22.1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057940" version="1" comment="pango-devel is &lt;1.22.1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057941" version="1" comment="pango-doc is &lt;1.22.1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057942" version="1" comment="pango-module-thai-lang is &lt;1.22.1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057943" version="1" comment="pango is &lt;1.22.1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052772" version="1" comment="pango-32bit is &lt;1.22.1-2.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052773" version="1" comment="pango-64bit is &lt;1.22.1-2.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052774" version="1" comment="pango-devel is &lt;1.22.1-2.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052775" version="1" comment="pango-doc is &lt;1.22.1-2.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052776" version="1" comment="pango-module-thai-lang is &lt;1.22.1-2.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052777" version="1" comment="pango is &lt;1.22.1-2.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055738" version="1" comment="apache2-devel is &lt;2.2.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055739" version="1" comment="apache2-doc is &lt;2.2.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055740" version="1" comment="apache2-example-pages is &lt;2.2.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055741" version="1" comment="apache2-prefork is &lt;2.2.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055742" version="1" comment="apache2-utils is &lt;2.2.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055743" version="1" comment="apache2-worker is &lt;2.2.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055744" version="1" comment="apache2 is &lt;2.2.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052785" version="1" comment="wireshark-devel is &lt;1.0.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052786" version="1" comment="wireshark is &lt;1.0.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054537" version="1" comment="opera is &lt;10.00-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053773" version="1" comment="memcached is &lt;1.2.6-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052795" version="1" comment="libxine1-32bit is &lt;1.1.15-23.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052796" version="1" comment="libxine1 is &lt;1.1.15-23.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052809" version="1" comment="apport-crashdb-opensuse is &lt;0.114-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052810" version="1" comment="apport-gtk is &lt;0.114-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052811" version="1" comment="apport-qt is &lt;0.114-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052812" version="1" comment="apport-retrace is &lt;0.114-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052813" version="1" comment="apport is &lt;0.114-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054874" version="1" comment="open-iscsi is &lt;2.0.870-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058983" version="1" comment="libpulse-browse0 is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058984" version="1" comment="libpulse-devel is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058985" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058986" version="1" comment="libpulse0-32bit is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058987" version="1" comment="libpulse0 is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058988" version="1" comment="pulseaudio-esound-compat is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058989" version="1" comment="pulseaudio-lang is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058990" version="1" comment="pulseaudio-module-bluetooth is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058991" version="1" comment="pulseaudio-module-gconf is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058992" version="1" comment="pulseaudio-module-jack is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058993" version="1" comment="pulseaudio-module-lirc is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058994" version="1" comment="pulseaudio-module-x11 is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058995" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058996" version="1" comment="pulseaudio-utils is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058997" version="1" comment="pulseaudio is &lt;0.9.14-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053247" version="1" comment="MozillaThunderbird-devel is &lt;2.0.0.22-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053248" version="1" comment="MozillaThunderbird-translations is &lt;2.0.0.22-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053249" version="1" comment="MozillaThunderbird is &lt;2.0.0.22-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055407" version="1" comment="seamonkey-dom-inspector is &lt;1.1.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055408" version="1" comment="seamonkey-irc is &lt;1.1.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055409" version="1" comment="seamonkey-mail is &lt;1.1.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055410" version="1" comment="seamonkey-spellchecker is &lt;1.1.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055411" version="1" comment="seamonkey-venkman is &lt;1.1.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055412" version="1" comment="seamonkey is &lt;1.1.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052826" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032367" version="1" comment="MozillaFirefox-translations is &lt;3.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032368" version="1" comment="MozillaFirefox is &lt;3.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032369" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052827" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052828" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032370" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052829" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032371" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032373" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052830" version="1" comment="python-xpcom190 is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052836" version="1" comment="libwmf-32bit is &lt;0.2.8.4-206.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052837" version="1" comment="libwmf-64bit is &lt;0.2.8.4-206.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052838" version="1" comment="libwmf-devel is &lt;0.2.8.4-206.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052839" version="1" comment="libwmf-devel is &lt;0.2.8.4-206.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052840" version="1" comment="libwmf-gnome-32bit is &lt;0.2.8.4-206.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052841" version="1" comment="libwmf-gnome-64bit is &lt;0.2.8.4-206.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052842" version="1" comment="libwmf-gnome is &lt;0.2.8.4-206.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052843" version="1" comment="libwmf-gnome is &lt;0.2.8.4-206.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052844" version="1" comment="libwmf is &lt;0.2.8.4-206.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052845" version="1" comment="libwmf is &lt;0.2.8.4-206.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052856" version="1" comment="clamav-db is &lt;0.95.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052857" version="1" comment="clamav is &lt;0.95.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053491" version="1" comment="finch-devel is &lt;2.5.1-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053492" version="1" comment="finch is &lt;2.5.1-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053493" version="1" comment="libpurple-devel is &lt;2.5.1-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053494" version="1" comment="libpurple-lang is &lt;2.5.1-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053495" version="1" comment="libpurple-meanwhile is &lt;2.5.1-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053496" version="1" comment="libpurple-mono is &lt;2.5.1-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053497" version="1" comment="libpurple is &lt;2.5.1-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053498" version="1" comment="pidgin-devel is &lt;2.5.1-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053499" version="1" comment="pidgin is &lt;2.5.1-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052873" version="1" comment="libopenssl-devel is &lt;0.9.8h-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052874" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052875" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8h-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052876" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052877" version="1" comment="openssl-certs is &lt;0.9.8h-25.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052878" version="1" comment="openssl-doc is &lt;0.9.8h-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052879" version="1" comment="openssl is &lt;0.9.8h-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053548" version="1" comment="aufs-kmp-debug is &lt;cvs20081020_2.6.27.25_0.1-1.32.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053549" version="1" comment="aufs-kmp-trace is &lt;cvs20081020_2.6.27.25_0.1-1.32.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053550" version="1" comment="brocade-bfa-kmp-debug is &lt;1.1.0.2_2.6.27.25_0.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053551" version="1" comment="brocade-bfa-kmp-trace is &lt;1.1.0.2_2.6.27.25_0.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053552" version="1" comment="dazuko-kmp-debug is &lt;2.3.6_2.6.27.25_0.1-1.49.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053553" version="1" comment="dazuko-kmp-trace is &lt;2.3.6_2.6.27.25_0.1-1.49.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053554" version="1" comment="drbd-kmp-debug is &lt;8.2.7_2.6.27.25_0.1-1.19.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053555" version="1" comment="drbd-kmp-trace is &lt;8.2.7_2.6.27.25_0.1-1.19.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053556" version="1" comment="intel-iamt-heci-kmp-debug is &lt;3.1.0.31_2.6.27.25_0.1-2.40.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053557" version="1" comment="intel-iamt-heci-kmp-trace is &lt;3.1.0.31_2.6.27.25_0.1-2.40.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053558" version="1" comment="iscsitarget-kmp-debug is &lt;0.4.15_2.6.27.25_0.1-89.11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053559" version="1" comment="iscsitarget-kmp-trace is &lt;0.4.15_2.6.27.25_0.1-89.11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053560" version="1" comment="kernel-debug-base is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053561" version="1" comment="kernel-debug-extra is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053562" version="1" comment="kernel-debug is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053523" version="1" comment="kernel-default-base is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053546" version="1" comment="kernel-default-extra is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053524" version="1" comment="kernel-default is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053563" version="1" comment="kernel-docs is &lt;2.6.3-3.13.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053531" version="1" comment="kernel-kdump is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053536" version="1" comment="kernel-pae-base is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053564" version="1" comment="kernel-pae-extra is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053537" version="1" comment="kernel-pae is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053532" version="1" comment="kernel-ppc64-base is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053565" version="1" comment="kernel-ppc64-extra is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053533" version="1" comment="kernel-ppc64 is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053566" version="1" comment="kernel-ps3 is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053525" version="1" comment="kernel-source is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053526" version="1" comment="kernel-syms is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053567" version="1" comment="kernel-trace-base is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053568" version="1" comment="kernel-trace-extra is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053569" version="1" comment="kernel-trace is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053570" version="1" comment="kernel-vanilla is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053527" version="1" comment="kernel-xen-base is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053547" version="1" comment="kernel-xen-extra is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053528" version="1" comment="kernel-xen is &lt;2.6.27.25-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053571" version="1" comment="kqemu-kmp-debug is &lt;1.4.0pre1_2.6.27.25_0.1-2.1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053572" version="1" comment="kqemu-kmp-trace is &lt;1.4.0pre1_2.6.27.25_0.1-2.1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053573" version="1" comment="kvm-kmp-trace is &lt;78_2.6.27.25_0.1-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053574" version="1" comment="lirc-kmp-trace is &lt;0.8.4_2.6.27.25_0.1-0.1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053575" version="1" comment="ofed-kmp-debug is &lt;1.4_2.6.27.25_0.1-21.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053576" version="1" comment="ofed-kmp-trace is &lt;1.4_2.6.27.25_0.1-21.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053577" version="1" comment="oracleasm-kmp-debug is &lt;2.0.5_2.6.27.25_0.1-2.36.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053578" version="1" comment="oracleasm-kmp-trace is &lt;2.0.5_2.6.27.25_0.1-2.36.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053579" version="1" comment="pcfclock-kmp-debug is &lt;0.44_2.6.27.25_0.1-227.56.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053580" version="1" comment="pcfclock-kmp-trace is &lt;0.44_2.6.27.25_0.1-227.56.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053581" version="1" comment="virtualbox-ose-kmp-debug is &lt;2.0.6_2.6.27.25_0.1-2.8.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053582" version="1" comment="virtualbox-ose-kmp-trace is &lt;2.0.6_2.6.27.25_0.1-2.8.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053583" version="1" comment="vmware-kmp-debug is &lt;2008.09.03_2.6.27.25_0.1-5.50.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053584" version="1" comment="vmware-kmp-trace is &lt;2008.09.03_2.6.27.25_0.1-5.50.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052897" version="1" comment="libopenssl-devel is &lt;0.9.8h-28.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052898" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-28.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052899" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8h-28.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052900" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-28.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052901" version="1" comment="openssl-certs is &lt;0.9.8h-25.2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052902" version="1" comment="openssl-doc is &lt;0.9.8h-28.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052903" version="1" comment="openssl is &lt;0.9.8h-28.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061671" version="1" comment="kernel-debug-base is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061672" version="1" comment="kernel-debug-extra is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061673" version="1" comment="kernel-debug is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061674" version="1" comment="kernel-default-base is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061675" version="1" comment="kernel-default-extra is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061676" version="1" comment="kernel-default is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061677" version="1" comment="kernel-docs is &lt;2.6.3-3.13.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061678" version="1" comment="kernel-kdump is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061679" version="1" comment="kernel-pae-base is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061680" version="1" comment="kernel-pae-extra is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061681" version="1" comment="kernel-pae is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061682" version="1" comment="kernel-ppc64-base is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061683" version="1" comment="kernel-ppc64-extra is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061684" version="1" comment="kernel-ppc64 is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061685" version="1" comment="kernel-ps3 is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061686" version="1" comment="kernel-source is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061687" version="1" comment="kernel-syms is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061688" version="1" comment="kernel-trace-base is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061689" version="1" comment="kernel-trace-extra is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061690" version="1" comment="kernel-trace is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061691" version="1" comment="kernel-vanilla is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061692" version="1" comment="kernel-xen-base is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061693" version="1" comment="kernel-xen-extra is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061694" version="1" comment="kernel-xen is &lt;2.6.27.48-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054196" version="1" comment="aufs-kmp-debug is &lt;cvs20081020_2.6.27.29_0.1-1.32.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054197" version="1" comment="aufs-kmp-trace is &lt;cvs20081020_2.6.27.29_0.1-1.32.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054198" version="1" comment="brocade-bfa-kmp-debug is &lt;1.1.0.2_2.6.27.29_0.1-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054199" version="1" comment="brocade-bfa-kmp-trace is &lt;1.1.0.2_2.6.27.29_0.1-1.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054200" version="1" comment="dazuko-kmp-debug is &lt;2.3.6_2.6.27.29_0.1-1.49.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054201" version="1" comment="dazuko-kmp-trace is &lt;2.3.6_2.6.27.29_0.1-1.49.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054202" version="1" comment="drbd-kmp-debug is &lt;8.2.7_2.6.27.29_0.1-1.19.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054203" version="1" comment="drbd-kmp-trace is &lt;8.2.7_2.6.27.29_0.1-1.19.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054204" version="1" comment="intel-iamt-heci-kmp-debug is &lt;3.1.0.31_2.6.27.29_0.1-2.40.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054205" version="1" comment="intel-iamt-heci-kmp-trace is &lt;3.1.0.31_2.6.27.29_0.1-2.40.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054206" version="1" comment="iscsitarget-kmp-debug is &lt;0.4.15_2.6.27.29_0.1-89.11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054207" version="1" comment="iscsitarget-kmp-trace is &lt;0.4.15_2.6.27.29_0.1-89.11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054208" version="1" comment="kernel-debug-base is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054209" version="1" comment="kernel-debug-extra is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054210" version="1" comment="kernel-debug is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054108" version="1" comment="kernel-default-base is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054182" version="1" comment="kernel-default-extra is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054109" version="1" comment="kernel-default is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054211" version="1" comment="kernel-docs is &lt;2.6.3-3.13.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054180" version="1" comment="kernel-ec2-base is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054212" version="1" comment="kernel-ec2-extra is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054181" version="1" comment="kernel-ec2 is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054119" version="1" comment="kernel-kdump is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054110" version="1" comment="kernel-pae-base is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054183" version="1" comment="kernel-pae-extra is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054111" version="1" comment="kernel-pae is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054120" version="1" comment="kernel-ppc64-base is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054213" version="1" comment="kernel-ppc64-extra is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054121" version="1" comment="kernel-ppc64 is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054214" version="1" comment="kernel-ps3 is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054112" version="1" comment="kernel-source is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054113" version="1" comment="kernel-syms is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054215" version="1" comment="kernel-trace-base is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054216" version="1" comment="kernel-trace-extra is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054217" version="1" comment="kernel-trace is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054218" version="1" comment="kernel-vanilla is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054116" version="1" comment="kernel-xen-base is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054184" version="1" comment="kernel-xen-extra is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054117" version="1" comment="kernel-xen is &lt;2.6.27.29-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054219" version="1" comment="kqemu-kmp-debug is &lt;1.4.0pre1_2.6.27.29_0.1-2.1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054220" version="1" comment="kqemu-kmp-trace is &lt;1.4.0pre1_2.6.27.29_0.1-2.1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054221" version="1" comment="kvm-kmp-trace is &lt;78_2.6.27.29_0.1-6.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054222" version="1" comment="lirc-kmp-trace is &lt;0.8.4_2.6.27.29_0.1-0.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054223" version="1" comment="ofed-kmp-debug is &lt;1.4_2.6.27.29_0.1-21.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054224" version="1" comment="ofed-kmp-trace is &lt;1.4_2.6.27.29_0.1-21.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054225" version="1" comment="oracleasm-kmp-debug is &lt;2.0.5_2.6.27.29_0.1-2.36.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054226" version="1" comment="oracleasm-kmp-trace is &lt;2.0.5_2.6.27.29_0.1-2.36.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054227" version="1" comment="pcfclock-kmp-debug is &lt;0.44_2.6.27.29_0.1-227.56.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054228" version="1" comment="pcfclock-kmp-trace is &lt;0.44_2.6.27.29_0.1-227.56.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054229" version="1" comment="virtualbox-ose-kmp-debug is &lt;2.0.6_2.6.27.29_0.1-2.8.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054230" version="1" comment="virtualbox-ose-kmp-trace is &lt;2.0.6_2.6.27.29_0.1-2.8.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054231" version="1" comment="vmware-kmp-debug is &lt;2008.09.03_2.6.27.29_0.1-5.50.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054232" version="1" comment="vmware-kmp-trace is &lt;2008.09.03_2.6.27.29_0.1-5.50.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052909" version="1" comment="perl-32bit is &lt;5.10.0-62.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052910" version="1" comment="perl-64bit is &lt;5.10.0-62.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052911" version="1" comment="perl-base-32bit is &lt;5.10.0-62.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052912" version="1" comment="perl-base-64bit is &lt;5.10.0-62.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052913" version="1" comment="perl-base is &lt;5.10.0-62.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052914" version="1" comment="perl-doc is &lt;5.10.0-62.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052915" version="1" comment="perl is &lt;5.10.0-62.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052930" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032389" version="1" comment="MozillaFirefox-translations is &lt;3.0.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032390" version="1" comment="MozillaFirefox is &lt;3.0.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032391" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.11-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052931" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.11-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052932" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.11-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032392" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.11-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052933" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.11-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032393" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.11-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032395" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.11-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052934" version="1" comment="python-xpcom190 is &lt;1.9.0.11-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053149" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.8-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053150" version="1" comment="gstreamer-0_10-plugins-bad-doc is &lt;0.10.8-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053151" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.8-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053152" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.8-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053153" version="1" comment="libgstapp-0_10-0 is &lt;0.10.8-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052937" version="1" comment="acroread is &lt;8.1.5-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059690" version="1" comment="gimp-branding-upstream is &lt;2.6.2-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059691" version="1" comment="gimp-devel is &lt;2.6.2-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059692" version="1" comment="gimp-doc is &lt;2.6.2-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059693" version="1" comment="gimp-lang is &lt;2.6.2-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059694" version="1" comment="gimp-plugins-python is &lt;2.6.2-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059695" version="1" comment="gimp is &lt;2.6.2-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058425" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058426" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.18-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058427" version="1" comment="MozillaFirefox-translations is &lt;3.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058428" version="1" comment="MozillaFirefox-translations is &lt;3.0.18-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058429" version="1" comment="MozillaFirefox is &lt;3.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058430" version="1" comment="MozillaFirefox is &lt;3.0.18-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058358" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058431" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058432" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058359" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058433" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058360" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058362" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058434" version="1" comment="python-xpcom190 is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052946" version="1" comment="quagga-devel is &lt;0.99.10-17.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052947" version="1" comment="quagga is &lt;0.99.10-17.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052950" version="1" comment="novell-ipsec-tools-devel is &lt;0.7.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052951" version="1" comment="novell-ipsec-tools is &lt;0.7.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052955" version="1" comment="ipsec-tools is &lt;0.7.1-10.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064902" version="1" comment="kdelibs3-32bit is &lt;3.5.10-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064903" version="1" comment="kdelibs3-64bit is &lt;3.5.10-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064904" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.10-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064905" version="1" comment="kdelibs3-arts-64bit is &lt;3.5.10-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064906" version="1" comment="kdelibs3-arts is &lt;3.5.10-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064907" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064908" version="1" comment="kdelibs3-default-style-64bit is &lt;3.5.10-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064909" version="1" comment="kdelibs3-default-style is &lt;3.5.10-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064910" version="1" comment="kdelibs3-devel is &lt;3.5.10-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064911" version="1" comment="kdelibs3-doc is &lt;3.5.10-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064912" version="1" comment="kdelibs3 is &lt;3.5.10-21.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054511" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054512" version="1" comment="OpenEXR-64bit is &lt;1.6.1-83.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054513" version="1" comment="OpenEXR-devel is &lt;1.6.1-83.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054514" version="1" comment="OpenEXR-doc is &lt;1.6.1-83.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054515" version="1" comment="OpenEXR is &lt;1.6.1-83.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064913" version="1" comment="kdelibs4-core is &lt;4.1.3-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064914" version="1" comment="kdelibs4-doc is &lt;4.1.3-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064915" version="1" comment="kdelibs4 is &lt;4.1.3-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064916" version="1" comment="libkde4-32bit is &lt;4.1.3-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064917" version="1" comment="libkde4-devel is &lt;4.1.3-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064918" version="1" comment="libkde4 is &lt;4.1.3-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064919" version="1" comment="libkdecore4-32bit is &lt;4.1.3-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064920" version="1" comment="libkdecore4-devel is &lt;4.1.3-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064921" version="1" comment="libkdecore4 is &lt;4.1.3-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053515" version="1" comment="libsndfile-32bit is &lt;1.0.17-171.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053516" version="1" comment="libsndfile-64bit is &lt;1.0.17-171.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053517" version="1" comment="libsndfile-devel is &lt;1.0.17-171.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053518" version="1" comment="libsndfile-octave is &lt;1.0.17-171.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053519" version="1" comment="libsndfile-progs is &lt;1.0.17-171.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053520" version="1" comment="libsndfile is &lt;1.0.17-171.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052969" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052970" version="1" comment="ImageMagick-extra is &lt;6.4.3.6-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052971" version="1" comment="ImageMagick is &lt;6.4.3.6-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052972" version="1" comment="libMagick++-devel is &lt;6.4.3.6-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052973" version="1" comment="libMagick++1 is &lt;6.4.3.6-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052974" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052975" version="1" comment="libMagickCore1-64bit is &lt;6.4.3.6-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052976" version="1" comment="libMagickCore1 is &lt;6.4.3.6-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052977" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052978" version="1" comment="libMagickWand1-64bit is &lt;6.4.3.6-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052979" version="1" comment="libMagickWand1 is &lt;6.4.3.6-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052980" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052988" version="1" comment="GraphicsMagick-devel is &lt;1.2.5-4.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052989" version="1" comment="GraphicsMagick is &lt;1.2.5-4.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052990" version="1" comment="libGraphicsMagick++-devel is &lt;1.2.5-4.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052991" version="1" comment="libGraphicsMagick++2 is &lt;1.2.5-4.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052992" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052993" version="1" comment="libGraphicsMagickWand1 is &lt;1.2.5-4.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052994" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054075" version="1" comment="Xerces-c is &lt;2.8.0-29.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054076" version="1" comment="libXerces-c-devel is &lt;2.8.0-29.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054077" version="1" comment="libXerces-c28 is &lt;2.8.0-29.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053293" version="1" comment="cifs-mount is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053294" version="1" comment="ldapsmb is &lt;1.34b-6.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053295" version="1" comment="libnetapi-devel is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053296" version="1" comment="libnetapi0 is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053297" version="1" comment="libsmbclient-devel is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053298" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053299" version="1" comment="libsmbclient0-64bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053300" version="1" comment="libsmbclient0 is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053301" version="1" comment="libsmbsharemodes-devel is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053302" version="1" comment="libsmbsharemodes0 is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053303" version="1" comment="libtalloc-devel is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053304" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053305" version="1" comment="libtalloc1-64bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053306" version="1" comment="libtalloc1 is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053307" version="1" comment="libtdb-devel is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053308" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053309" version="1" comment="libtdb1-64bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053310" version="1" comment="libtdb1 is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053311" version="1" comment="libwbclient-devel is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053312" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053313" version="1" comment="libwbclient0-64bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053314" version="1" comment="libwbclient0 is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053315" version="1" comment="samba-32bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053316" version="1" comment="samba-64bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053317" version="1" comment="samba-client-32bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053318" version="1" comment="samba-client-64bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053319" version="1" comment="samba-client is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053320" version="1" comment="samba-devel is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053321" version="1" comment="samba-krb-printing is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053322" version="1" comment="samba-vscan is &lt;0.3.6b-6.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053323" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053324" version="1" comment="samba-winbind-64bit is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053325" version="1" comment="samba-winbind is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053326" version="1" comment="samba is &lt;3.2.7-11.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053010" version="1" comment="apache2-mod_security2 is &lt;2.5.6-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053161" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.10-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053162" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.10-3.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053163" version="1" comment="gstreamer-0_10-plugins-good-extra is &lt;0.10.10-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053164" version="1" comment="gstreamer-0_10-plugins-good-extra is &lt;0.10.10-3.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053165" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.10-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053166" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.10-3.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053167" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.10-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053168" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.10-3.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053016" version="1" comment="strongswan-doc is &lt;4.2.8-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053017" version="1" comment="strongswan is &lt;4.2.8-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053020" version="1" comment="irssi-devel is &lt;0.8.12-30.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053021" version="1" comment="irssi is &lt;0.8.12-30.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053384" version="1" comment="libpng-devel-32bit is &lt;1.2.31-4.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053385" version="1" comment="libpng-devel-64bit is &lt;1.2.31-4.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053386" version="1" comment="libpng-devel is &lt;1.2.31-4.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053387" version="1" comment="libpng12-0-32bit is &lt;1.2.31-4.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053388" version="1" comment="libpng12-0-64bit is &lt;1.2.31-4.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053389" version="1" comment="libpng12-0 is &lt;1.2.31-4.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053390" version="1" comment="libpng3 is &lt;1.2.31-4.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053451" version="1" comment="strongswan-doc is &lt;4.2.8-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053452" version="1" comment="strongswan is &lt;4.2.8-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053455" version="1" comment="openswan-doc is &lt;2.6.16-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053456" version="1" comment="openswan is &lt;2.6.16-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053736" version="1" comment="libtiff3-32bit is &lt;3.8.2-133.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053737" version="1" comment="libtiff3-64bit is &lt;3.8.2-133.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053738" version="1" comment="libtiff3 is &lt;3.8.2-133.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053680" version="1" comment="nagios-devel is &lt;3.0.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053681" version="1" comment="nagios-www is &lt;3.0.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053682" version="1" comment="nagios is &lt;3.0.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054087" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-133.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054088" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-133.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054089" version="1" comment="libtiff-devel is &lt;3.8.2-133.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054090" version="1" comment="libtiff3-32bit is &lt;3.8.2-133.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054091" version="1" comment="libtiff3-64bit is &lt;3.8.2-133.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054092" version="1" comment="libtiff3 is &lt;3.8.2-133.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054093" version="1" comment="tiff is &lt;3.8.2-133.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053937" version="1" comment="libfreebl3-32bit is &lt;3.12.3.1-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053969" version="1" comment="libfreebl3-64bit is &lt;3.12.3.1-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053939" version="1" comment="libfreebl3 is &lt;3.12.3.1-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053940" version="1" comment="mozilla-nss-32bit is &lt;3.12.3.1-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053970" version="1" comment="mozilla-nss-64bit is &lt;3.12.3.1-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053960" version="1" comment="mozilla-nss-devel is &lt;3.12.3.1-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053941" version="1" comment="mozilla-nss-tools is &lt;3.12.3.1-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053943" version="1" comment="mozilla-nss is &lt;3.12.3.1-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054944" version="1" comment="mutt is &lt;1.5.17-42.113.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055795" version="1" comment="libneon-devel is &lt;0.28.3-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055796" version="1" comment="libneon27-32bit is &lt;0.28.3-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055797" version="1" comment="libneon27-64bit is &lt;0.28.3-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055798" version="1" comment="libneon27 is &lt;0.28.3-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055799" version="1" comment="neon is &lt;0.28.3-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054884" version="1" comment="MozillaThunderbird-devel is &lt;2.0.0.23-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054885" version="1" comment="MozillaThunderbird-translations is &lt;2.0.0.23-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054886" version="1" comment="MozillaThunderbird is &lt;2.0.0.23-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054887" version="1" comment="hunspell-32bit is &lt;1.2.7-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054888" version="1" comment="hunspell-64bit is &lt;1.2.7-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054889" version="1" comment="hunspell is &lt;1.2.7-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054890" version="1" comment="hunspell is &lt;1.2.7-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054891" version="1" comment="hunspell is &lt;1.2.7-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054957" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.12-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054958" version="1" comment="libldap-2_4-2-64bit is &lt;2.4.12-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054959" version="1" comment="libldap-2_4-2 is &lt;2.4.12-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054960" version="1" comment="openldap2-back-meta is &lt;2.4.12-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054961" version="1" comment="openldap2-back-perl is &lt;2.4.12-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054962" version="1" comment="openldap2-client is &lt;2.4.12-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054963" version="1" comment="openldap2-devel-32bit is &lt;2.4.12-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054964" version="1" comment="openldap2-devel-64bit is &lt;2.4.12-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054965" version="1" comment="openldap2-devel is &lt;2.4.12-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054966" version="1" comment="openldap2 is &lt;2.4.12-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056405" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.2_b16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056406" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.2_b16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056407" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6.2_b16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056408" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.6.2_b16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056409" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6.2_b16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056410" version="1" comment="java-1_6_0-openjdk is &lt;1.6.2_b16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053796" version="1" comment="subversion-devel is &lt;1.5.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053797" version="1" comment="subversion-perl is &lt;1.5.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053798" version="1" comment="subversion-python is &lt;1.5.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053799" version="1" comment="subversion-server is &lt;1.5.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053800" version="1" comment="subversion-tools is &lt;1.5.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053801" version="1" comment="subversion is &lt;1.5.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055572" version="1" comment="libapr-util1-dbd-mysql is &lt;1.3.4-13.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055573" version="1" comment="libapr-util1-dbd-pgsql is &lt;1.3.4-13.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055574" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-13.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055575" version="1" comment="libapr-util1-devel is &lt;1.3.4-13.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055576" version="1" comment="libapr-util1 is &lt;1.3.4-13.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055577" version="1" comment="libapr1-devel is &lt;1.3.3-12.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055578" version="1" comment="libapr1 is &lt;1.3.3-12.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053809" version="1" comment="libxml2-32bit is &lt;2.7.1-9.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053810" version="1" comment="libxml2-64bit is &lt;2.7.1-9.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053811" version="1" comment="libxml2-devel-32bit is &lt;2.7.1-9.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053812" version="1" comment="libxml2-devel-64bit is &lt;2.7.1-9.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053813" version="1" comment="libxml2-devel is &lt;2.7.1-9.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053814" version="1" comment="libxml2-doc is &lt;2.7.1-9.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053815" version="1" comment="libxml2 is &lt;2.7.1-9.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054834" version="1" comment="libxml-32bit is &lt;1.8.17-480.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054835" version="1" comment="libxml-64bit is &lt;1.8.17-480.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054836" version="1" comment="libxml-devel is &lt;1.8.17-480.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054837" version="1" comment="libxml is &lt;1.8.17-480.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054237" version="1" comment="curl is &lt;7.19.0-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054238" version="1" comment="libcurl-devel is &lt;7.19.0-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054239" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054240" version="1" comment="libcurl4-64bit is &lt;7.19.0-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054241" version="1" comment="libcurl4 is &lt;7.19.0-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053932" version="1" comment="curl is &lt;7.19.0-11.2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053933" version="1" comment="libcurl-devel is &lt;7.19.0-11.2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053934" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053935" version="1" comment="libcurl4-64bit is &lt;7.19.0-11.2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053936" version="1" comment="libcurl4 is &lt;7.19.0-11.2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055005" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6_b16-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055006" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6_b16-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055007" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6_b16-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055008" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.6_b16-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055009" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6_b16-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055010" version="1" comment="java-1_6_0-openjdk is &lt;1.6_b16-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053757" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053758" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053759" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053760" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053761" version="1" comment="java-1_6_0-sun-src is &lt;1.6.0.u15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053762" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053764" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053765" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053766" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053767" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053768" version="1" comment="java-1_5_0-sun-src is &lt;1.5.0_update20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053769" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056456" version="1" comment="wireshark-devel is &lt;1.0.4-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056457" version="1" comment="wireshark is &lt;1.0.4-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054526" version="1" comment="wireshark-devel is &lt;1.0.4-2.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054527" version="1" comment="wireshark is &lt;1.0.4-2.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058910" version="1" comment="wireshark-devel is &lt;1.0.4-2.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058911" version="1" comment="wireshark is &lt;1.0.4-2.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059069" version="1" comment="squid-beta is &lt;3.0-438.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059070" version="1" comment="squid3 is &lt;3.0.STABLE10-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059071" version="1" comment="squid is &lt;2.7.STABLE5-1.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057454" version="1" comment="gzip is &lt;1.3.12-68.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058346" version="1" comment="libexpat0-32bit is &lt;1.95.8-64.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058347" version="1" comment="libexpat0-64bit is &lt;1.95.8-64.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058348" version="1" comment="libexpat0 is &lt;1.95.8-64.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054463" version="1" comment="kompozer is &lt;0.7.99.0.4-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060413" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-2.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060414" version="1" comment="libpython2_6-1_0-64bit is &lt;2.6.0-2.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060415" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-2.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060416" version="1" comment="python-32bit is &lt;2.6.0-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060417" version="1" comment="python-64bit is &lt;2.6.0-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060418" version="1" comment="python-base-32bit is &lt;2.6.0-2.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060419" version="1" comment="python-base-64bit is &lt;2.6.0-2.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060420" version="1" comment="python-base is &lt;2.6.0-2.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060421" version="1" comment="python-curses is &lt;2.6.0-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060422" version="1" comment="python-demo is &lt;2.6.0-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060423" version="1" comment="python-devel is &lt;2.6.0-2.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060424" version="1" comment="python-gdbm is &lt;2.6.0-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060425" version="1" comment="python-idle is &lt;2.6.0-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060426" version="1" comment="python-tk is &lt;2.6.0-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060427" version="1" comment="python-xml is &lt;2.6.0-2.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060428" version="1" comment="python is &lt;2.6.0-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054384" version="1" comment="xerces-j2-demo is &lt;2.8.1-238.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054385" version="1" comment="xerces-j2-javadoc-apis is &lt;2.8.1-238.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054386" version="1" comment="xerces-j2-javadoc-dom3 is &lt;2.8.1-238.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054387" version="1" comment="xerces-j2-javadoc-impl is &lt;2.8.1-238.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054388" version="1" comment="xerces-j2-javadoc-other is &lt;2.8.1-238.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054389" version="1" comment="xerces-j2-javadoc-xni is &lt;2.8.1-238.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054390" version="1" comment="xerces-j2-scripts is &lt;2.8.1-238.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054391" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-238.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054392" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-238.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054393" version="1" comment="xerces-j2 is &lt;2.8.1-238.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055139" version="1" comment="dovecot11-backend-mysql is &lt;1.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055140" version="1" comment="dovecot11-backend-pgsql is &lt;1.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055141" version="1" comment="dovecot11-backend-sqlite is &lt;1.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055142" version="1" comment="dovecot11-devel is &lt;1.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055143" version="1" comment="dovecot11-fts-lucene is &lt;1.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055144" version="1" comment="dovecot11 is &lt;1.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054971" version="1" comment="cyrus-imapd-devel is &lt;2.3.11-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054972" version="1" comment="cyrus-imapd is &lt;2.3.11-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054973" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054974" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054029" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.13-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054030" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.13-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053944" version="1" comment="MozillaFirefox-translations is &lt;3.0.13-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054031" version="1" comment="MozillaFirefox-translations is &lt;3.0.13-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053945" version="1" comment="MozillaFirefox is &lt;3.0.13-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054032" version="1" comment="MozillaFirefox is &lt;3.0.13-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054033" version="1" comment="gconf2-32bit is &lt;2.24.0-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054034" version="1" comment="gconf2 is &lt;2.24.0-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054035" version="1" comment="gconf2 is &lt;2.24.0-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054036" version="1" comment="libidl-32bit is &lt;0.8.11-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054037" version="1" comment="libidl-64bit is &lt;0.8.11-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054038" version="1" comment="libidl is &lt;0.8.11-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054039" version="1" comment="libidl is &lt;0.8.11-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054040" version="1" comment="libidl is &lt;0.8.11-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053952" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053971" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053972" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053953" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053974" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053954" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053956" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054041" version="1" comment="orbit2-32bit is &lt;2.14.16-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054042" version="1" comment="orbit2-64bit is &lt;2.14.16-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054043" version="1" comment="orbit2 is &lt;2.14.16-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054044" version="1" comment="orbit2 is &lt;2.14.16-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054045" version="1" comment="orbit2 is &lt;2.14.16-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054046" version="1" comment="python-xpcom190 is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054977" version="1" comment="openswan-doc is &lt;2.6.16-1.49.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054978" version="1" comment="openswan is &lt;2.6.16-1.49.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054983" version="1" comment="strongswan-doc is &lt;4.2.8-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054984" version="1" comment="strongswan is &lt;4.2.8-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061110" version="1" comment="libvorbis-32bit is &lt;1.2.0-78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061111" version="1" comment="libvorbis-64bit is &lt;1.2.0-78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061112" version="1" comment="libvorbis-devel is &lt;1.2.0-78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061113" version="1" comment="libvorbis-doc is &lt;1.2.0-78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061114" version="1" comment="libvorbis is &lt;1.2.0-78.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053829" version="1" comment="fetchmail is &lt;6.3.8.90-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053830" version="1" comment="fetchmailconf is &lt;6.3.8.90-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055298" version="1" comment="apache2-mod_php5 is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055299" version="1" comment="php5-bcmath is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055300" version="1" comment="php5-bz2 is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055301" version="1" comment="php5-calendar is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055302" version="1" comment="php5-ctype is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055303" version="1" comment="php5-curl is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055304" version="1" comment="php5-dba is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055305" version="1" comment="php5-dbase is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055306" version="1" comment="php5-devel is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055307" version="1" comment="php5-dom is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055308" version="1" comment="php5-exif is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055309" version="1" comment="php5-fastcgi is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055310" version="1" comment="php5-ftp is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055311" version="1" comment="php5-gd is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055312" version="1" comment="php5-gettext is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055313" version="1" comment="php5-gmp is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055314" version="1" comment="php5-hash is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055315" version="1" comment="php5-iconv is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055316" version="1" comment="php5-imap is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055317" version="1" comment="php5-json is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055318" version="1" comment="php5-ldap is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055319" version="1" comment="php5-mbstring is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055320" version="1" comment="php5-mcrypt is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055321" version="1" comment="php5-mysql is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055322" version="1" comment="php5-ncurses is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055323" version="1" comment="php5-odbc is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055324" version="1" comment="php5-openssl is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055325" version="1" comment="php5-pcntl is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055326" version="1" comment="php5-pdo is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055327" version="1" comment="php5-pear is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055328" version="1" comment="php5-pgsql is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055329" version="1" comment="php5-posix is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055330" version="1" comment="php5-pspell is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055331" version="1" comment="php5-readline is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055332" version="1" comment="php5-shmop is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055333" version="1" comment="php5-snmp is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055334" version="1" comment="php5-soap is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055335" version="1" comment="php5-sockets is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055336" version="1" comment="php5-sqlite is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055337" version="1" comment="php5-suhosin is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055338" version="1" comment="php5-sysvmsg is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055339" version="1" comment="php5-sysvsem is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055340" version="1" comment="php5-sysvshm is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055341" version="1" comment="php5-tidy is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055342" version="1" comment="php5-tokenizer is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055343" version="1" comment="php5-wddx is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055344" version="1" comment="php5-xmlreader is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055345" version="1" comment="php5-xmlrpc is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055346" version="1" comment="php5-xmlwriter is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055347" version="1" comment="php5-xsl is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055348" version="1" comment="php5-zip is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055349" version="1" comment="php5-zlib is &lt;5.2.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054277" version="1" comment="xemacs-el is &lt;21.5.28.20080401-58.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054278" version="1" comment="xemacs-info is &lt;21.5.28.20080401-58.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054279" version="1" comment="xemacs is &lt;21.5.28.20080401-58.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054473" version="1" comment="finch-devel is &lt;2.5.1-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054474" version="1" comment="finch is &lt;2.5.1-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054475" version="1" comment="libpurple-devel is &lt;2.5.1-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054476" version="1" comment="libpurple-lang is &lt;2.5.1-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054477" version="1" comment="libpurple-meanwhile is &lt;2.5.1-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054478" version="1" comment="libpurple-mono is &lt;2.5.1-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054479" version="1" comment="libpurple is &lt;2.5.1-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054480" version="1" comment="pidgin-devel is &lt;2.5.1-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054481" version="1" comment="pidgin is &lt;2.5.1-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054802" version="1" comment="gnutls is &lt;2.4.1-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054803" version="1" comment="libgnutls-devel is &lt;2.4.1-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054804" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054805" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054806" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054807" version="1" comment="libgnutls26-64bit is &lt;2.4.1-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054808" version="1" comment="libgnutls26 is &lt;2.4.1-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055671" version="1" comment="cifs-mount is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055672" version="1" comment="ldapsmb is &lt;1.34b-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055673" version="1" comment="libnetapi-devel is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055674" version="1" comment="libnetapi0 is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055675" version="1" comment="libsmbclient-devel is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055676" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055677" version="1" comment="libsmbclient0-64bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055678" version="1" comment="libsmbclient0 is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055679" version="1" comment="libsmbsharemodes-devel is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055680" version="1" comment="libsmbsharemodes0 is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055681" version="1" comment="libtalloc-devel is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055682" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055683" version="1" comment="libtalloc1-64bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055684" version="1" comment="libtalloc1 is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055685" version="1" comment="libtdb-devel is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055686" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055687" version="1" comment="libtdb1-64bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055688" version="1" comment="libtdb1 is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055689" version="1" comment="libwbclient-devel is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055690" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055691" version="1" comment="libwbclient0-64bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055692" version="1" comment="libwbclient0 is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055693" version="1" comment="samba-32bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055694" version="1" comment="samba-64bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055695" version="1" comment="samba-client-32bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055696" version="1" comment="samba-client-64bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055697" version="1" comment="samba-client is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055698" version="1" comment="samba-devel is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055699" version="1" comment="samba-krb-printing is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055700" version="1" comment="samba-vscan is &lt;0.3.6b-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055701" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055702" version="1" comment="samba-winbind-64bit is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055703" version="1" comment="samba-winbind is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055704" version="1" comment="samba is &lt;3.2.7-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056130" version="1" comment="cups-client is &lt;1.3.9-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056131" version="1" comment="cups-devel is &lt;1.3.9-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056132" version="1" comment="cups-libs-32bit is &lt;1.3.9-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056133" version="1" comment="cups-libs-64bit is &lt;1.3.9-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056134" version="1" comment="cups-libs is &lt;1.3.9-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056135" version="1" comment="cups is &lt;1.3.9-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055841" version="1" comment="kernel-debug-base is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055842" version="1" comment="kernel-debug-extra is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055843" version="1" comment="kernel-debug is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055844" version="1" comment="kernel-default-base is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055845" version="1" comment="kernel-default-extra is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055846" version="1" comment="kernel-default is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055847" version="1" comment="kernel-docs is &lt;2.6.3-3.13.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055848" version="1" comment="kernel-ec2-base is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055849" version="1" comment="kernel-ec2-extra is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055850" version="1" comment="kernel-ec2 is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055851" version="1" comment="kernel-kdump is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055852" version="1" comment="kernel-pae-base is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055853" version="1" comment="kernel-pae-extra is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055854" version="1" comment="kernel-pae is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055855" version="1" comment="kernel-ppc64-base is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055856" version="1" comment="kernel-ppc64-extra is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055857" version="1" comment="kernel-ppc64 is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055858" version="1" comment="kernel-ps3 is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055859" version="1" comment="kernel-source is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055860" version="1" comment="kernel-syms is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055861" version="1" comment="kernel-trace-base is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055862" version="1" comment="kernel-trace-extra is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055863" version="1" comment="kernel-trace is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055864" version="1" comment="kernel-vanilla is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055865" version="1" comment="kernel-xen-base is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055866" version="1" comment="kernel-xen-extra is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055867" version="1" comment="kernel-xen is &lt;2.6.27.37-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055424" version="1" comment="libnewt0_52 is &lt;0.52.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055425" version="1" comment="newt-devel is &lt;0.52.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055426" version="1" comment="newt-doc is &lt;0.52.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055427" version="1" comment="newt-static is &lt;0.52.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055428" version="1" comment="newt is &lt;0.52.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055429" version="1" comment="python-newt is &lt;0.52.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054838" version="1" comment="dnsmasq is &lt;2.45-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055430" version="1" comment="rubygem-actionpack-2_1 is &lt;2.1.1-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055433" version="1" comment="rubygem-activesupport-2_1 is &lt;2.1.1-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054809" version="1" comment="perl-IO-Socket-SSL is &lt;1.16-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056729" version="1" comment="cdparanoia-32bit is &lt;IIIalpha9.8-690.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056730" version="1" comment="cdparanoia-64bit is &lt;IIIalpha9.8-690.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056731" version="1" comment="cdparanoia is &lt;IIIalpha9.8-690.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056732" version="1" comment="cdparanoia is &lt;IIIalpha9.8-690.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056733" version="1" comment="cdparanoia is &lt;IIIalpha9.8-690.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056734" version="1" comment="check-32bit is &lt;0.9.5-63.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056735" version="1" comment="check-64bit is &lt;0.9.5-63.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056736" version="1" comment="check is &lt;0.9.5-63.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056737" version="1" comment="check is &lt;0.9.5-63.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056738" version="1" comment="check is &lt;0.9.5-63.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056739" version="1" comment="desktop-file-utils is &lt;0.15-1.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056740" version="1" comment="desktop-file-utils is &lt;0.15-1.119" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056527" version="1" comment="desktop-file-utils is &lt;0.15-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056741" version="1" comment="fam-32bit is &lt;2.7.0-129.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056742" version="1" comment="fam-64bit is &lt;2.7.0-129.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056743" version="1" comment="fam is &lt;2.7.0-129.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056744" version="1" comment="fam is &lt;2.7.0-129.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056745" version="1" comment="fam is &lt;2.7.0-129.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056553" version="1" comment="finch-devel is &lt;2.6.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056554" version="1" comment="finch is &lt;2.6.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056746" version="1" comment="gnome-vfs2-32bit is &lt;2.24.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056747" version="1" comment="gnome-vfs2-lang is &lt;2.24.0-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056748" version="1" comment="gnome-vfs2-lang is &lt;2.24.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056749" version="1" comment="gnome-vfs2-lang is &lt;2.24.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056750" version="1" comment="gnome-vfs2 is &lt;2.24.0-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056751" version="1" comment="gnome-vfs2 is &lt;2.24.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056752" version="1" comment="gnome-vfs2 is &lt;2.24.0-3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056753" version="1" comment="gstreamer-0_10-32bit is &lt;0.10.21-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056754" version="1" comment="gstreamer-0_10-64bit is &lt;0.10.21-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056755" version="1" comment="gstreamer-0_10-lang is &lt;0.10.21-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056756" version="1" comment="gstreamer-0_10-lang is &lt;0.10.21-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056757" version="1" comment="gstreamer-0_10-lang is &lt;0.10.21-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056758" version="1" comment="gstreamer-0_10 is &lt;0.10.21-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056759" version="1" comment="gstreamer-0_10 is &lt;0.10.21-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056760" version="1" comment="gstreamer-0_10 is &lt;0.10.21-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056761" version="1" comment="libgstreamer-0_10-0-32bit is &lt;0.10.21-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056762" version="1" comment="libgstreamer-0_10-0-64bit is &lt;0.10.21-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056763" version="1" comment="libgstreamer-0_10-0 is &lt;0.10.21-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056764" version="1" comment="libgstreamer-0_10-0 is &lt;0.10.21-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056765" version="1" comment="libgstreamer-0_10-0 is &lt;0.10.21-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056766" version="1" comment="libogg0-32bit is &lt;1.1.3-86.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056767" version="1" comment="libogg0-64bit is &lt;1.1.3-86.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056768" version="1" comment="libogg0 is &lt;1.1.3-86.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056769" version="1" comment="libogg0 is &lt;1.1.3-86.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056770" version="1" comment="libogg0 is &lt;1.1.3-86.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056771" version="1" comment="liboil-32bit is &lt;0.3.15-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056772" version="1" comment="liboil-64bit is &lt;0.3.15-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056773" version="1" comment="liboil is &lt;0.3.15-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056774" version="1" comment="liboil is &lt;0.3.15-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056775" version="1" comment="liboil is &lt;0.3.15-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056557" version="1" comment="libpurple-devel is &lt;2.6.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056558" version="1" comment="libpurple-lang is &lt;2.6.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056608" version="1" comment="libpurple-meanwhile is &lt;2.6.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056609" version="1" comment="libpurple-mono is &lt;2.6.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056559" version="1" comment="libpurple is &lt;2.6.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056776" version="1" comment="libtheora0-32bit is &lt;1.0.beta2-3.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056777" version="1" comment="libtheora0 is &lt;1.0.beta2-3.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056778" version="1" comment="libtheora0 is &lt;1.0.beta2-3.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056779" version="1" comment="libtheora0 is &lt;1.0.beta2-3.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056780" version="1" comment="libvisual-32bit is &lt;0.4.0-174.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056781" version="1" comment="libvisual-64bit is &lt;0.4.0-174.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056782" version="1" comment="libvisual is &lt;0.4.0-174.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056783" version="1" comment="libvisual is &lt;0.4.0-174.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056784" version="1" comment="libvisual is &lt;0.4.0-174.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056785" version="1" comment="libvorbis-32bit is &lt;1.2.0-78.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056786" version="1" comment="libvorbis-64bit is &lt;1.2.0-78.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056787" version="1" comment="libvorbis is &lt;1.2.0-78.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056788" version="1" comment="libvorbis is &lt;1.2.0-78.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056789" version="1" comment="libvorbis is &lt;1.2.0-78.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056560" version="1" comment="pidgin-devel is &lt;2.6.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056790" version="1" comment="pidgin-otr is &lt;3.2.0-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056791" version="1" comment="pidgin-otr is &lt;3.2.0-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056561" version="1" comment="pidgin is &lt;2.6.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056914" version="1" comment="htmldoc is &lt;1.8.27-1.114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054985" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.14-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054986" version="1" comment="MozillaFirefox-translations is &lt;3.0.14-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054987" version="1" comment="MozillaFirefox is &lt;3.0.14-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054988" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054989" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054990" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054991" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054992" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054993" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054994" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054995" version="1" comment="python-xpcom190 is &lt;1.9.0.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057211" version="1" comment="kernel-debug-base is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057212" version="1" comment="kernel-debug-extra is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057213" version="1" comment="kernel-debug is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057214" version="1" comment="kernel-default-base is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057215" version="1" comment="kernel-default-extra is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057216" version="1" comment="kernel-default is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057217" version="1" comment="kernel-docs is &lt;2.6.3-3.13.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057218" version="1" comment="kernel-kdump is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057219" version="1" comment="kernel-pae-base is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057220" version="1" comment="kernel-pae-extra is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057221" version="1" comment="kernel-pae is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057222" version="1" comment="kernel-ppc64-base is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057223" version="1" comment="kernel-ppc64-extra is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057224" version="1" comment="kernel-ppc64 is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057225" version="1" comment="kernel-ps3 is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057226" version="1" comment="kernel-source is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057227" version="1" comment="kernel-syms is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057228" version="1" comment="kernel-trace-base is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057229" version="1" comment="kernel-trace-extra is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057230" version="1" comment="kernel-trace is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057231" version="1" comment="kernel-vanilla is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057232" version="1" comment="kernel-xen-base is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057233" version="1" comment="kernel-xen-extra is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057234" version="1" comment="kernel-xen is &lt;2.6.27.42-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055020" version="1" comment="postgresql-contrib is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055046" version="1" comment="postgresql-devel is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055021" version="1" comment="postgresql-docs is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055022" version="1" comment="postgresql-libs-32bit is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055047" version="1" comment="postgresql-libs-64bit is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055024" version="1" comment="postgresql-libs is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055025" version="1" comment="postgresql-server is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055026" version="1" comment="postgresql is &lt;8.3.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055816" version="1" comment="cyrus-imapd-devel is &lt;2.3.11-60.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055776" version="1" comment="cyrus-imapd is &lt;2.3.11-60.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055777" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055778" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055133" version="1" comment="wireshark-devel is &lt;1.0.4-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055134" version="1" comment="wireshark is &lt;1.0.4-2.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059339" version="1" comment="libopenssl-devel is &lt;0.9.8h-28.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059340" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-28.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059341" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8h-28.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059342" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-28.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059343" version="1" comment="openssl-certs is &lt;0.9.8h-25.2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059344" version="1" comment="openssl-doc is &lt;0.9.8h-28.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059345" version="1" comment="openssl is &lt;0.9.8h-28.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056091" version="1" comment="opera is &lt;10.01-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059887" version="1" comment="glib2-branding-upstream is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059888" version="1" comment="glib2-devel is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059889" version="1" comment="glib2-doc is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059890" version="1" comment="glib2-lang is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059891" version="1" comment="glib2 is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059892" version="1" comment="libgio-2_0-0-32bit is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059893" version="1" comment="libgio-2_0-0-64bit is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059894" version="1" comment="libgio-2_0-0 is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059895" version="1" comment="libgio-fam is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059896" version="1" comment="libglib-2_0-0-32bit is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059897" version="1" comment="libglib-2_0-0-64bit is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059898" version="1" comment="libglib-2_0-0 is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059899" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059900" version="1" comment="libgmodule-2_0-0-64bit is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059901" version="1" comment="libgmodule-2_0-0 is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059902" version="1" comment="libgobject-2_0-0-32bit is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059903" version="1" comment="libgobject-2_0-0-64bit is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059904" version="1" comment="libgobject-2_0-0 is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059905" version="1" comment="libgthread-2_0-0-32bit is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059906" version="1" comment="libgthread-2_0-0-64bit is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059907" version="1" comment="libgthread-2_0-0 is &lt;2.18.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057366" version="1" comment="krb5-32bit is &lt;1.6.3-132.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057367" version="1" comment="krb5-64bit is &lt;1.6.3-132.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057368" version="1" comment="krb5-apps-clients is &lt;1.6.3-132.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057369" version="1" comment="krb5-apps-servers is &lt;1.6.3-132.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057370" version="1" comment="krb5-client is &lt;1.6.3-132.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057371" version="1" comment="krb5-devel-32bit is &lt;1.6.3-132.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057372" version="1" comment="krb5-devel-64bit is &lt;1.6.3-132.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057373" version="1" comment="krb5-devel is &lt;1.6.3-132.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057374" version="1" comment="krb5-server is &lt;1.6.3-132.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057375" version="1" comment="krb5 is &lt;1.6.3-132.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057792" version="1" comment="fuse-devel is &lt;2.7.2-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057793" version="1" comment="fuse is &lt;2.7.2-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057794" version="1" comment="libfuse2 is &lt;2.7.2-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059351" version="1" comment="libtheora-devel is &lt;1.0.beta2-3.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059352" version="1" comment="libtheora0-32bit is &lt;1.0.beta2-3.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059353" version="1" comment="libtheora0 is &lt;1.0.beta2-3.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060727" version="1" comment="libcmpiutil-devel is &lt;0.5-15.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060728" version="1" comment="libcmpiutil is &lt;0.5-15.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060729" version="1" comment="libvirt-cim is &lt;0.5.2-4.22.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060730" version="1" comment="libvirt-devel is &lt;0.4.6-11.16.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060731" version="1" comment="libvirt-doc is &lt;0.4.6-11.16.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060732" version="1" comment="libvirt-python is &lt;0.4.6-11.16.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060733" version="1" comment="libvirt is &lt;0.4.6-11.16.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060734" version="1" comment="virt-manager is &lt;0.5.3-64.26.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060735" version="1" comment="virt-viewer is &lt;0.0.3-3.30.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060736" version="1" comment="vm-install is &lt;0.3.27-0.1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060737" version="1" comment="xen-devel is &lt;3.3.1_18546_24-0.4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060738" version="1" comment="xen-doc-html is &lt;3.3.1_18546_24-0.4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060739" version="1" comment="xen-doc-pdf is &lt;3.3.1_18546_24-0.4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060740" version="1" comment="xen-kmp-debug is &lt;3.3.1_18546_24_2.6.27.45_0.2-0.4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060741" version="1" comment="xen-kmp-default is &lt;3.3.1_18546_24_2.6.27.45_0.2-0.4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060742" version="1" comment="xen-kmp-pae is &lt;3.3.1_18546_24_2.6.27.45_0.2-0.4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060743" version="1" comment="xen-kmp-trace is &lt;3.3.1_18546_24_2.6.27.45_0.2-0.4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060744" version="1" comment="xen-libs-32bit is &lt;3.3.1_18546_24-0.4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060745" version="1" comment="xen-libs is &lt;3.3.1_18546_24-0.4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060746" version="1" comment="xen-tools-domU is &lt;3.3.1_18546_24-0.4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060747" version="1" comment="xen-tools is &lt;3.3.1_18546_24-0.4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060748" version="1" comment="xen is &lt;3.3.1_18546_24-0.4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057036" version="1" comment="cups-client is &lt;1.3.9-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057037" version="1" comment="cups-devel is &lt;1.3.9-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057038" version="1" comment="cups-libs-32bit is &lt;1.3.9-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057039" version="1" comment="cups-libs-64bit is &lt;1.3.9-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057040" version="1" comment="cups-libs is &lt;1.3.9-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057041" version="1" comment="cups is &lt;1.3.9-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059005" version="1" comment="cups-client is &lt;1.3.9-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059006" version="1" comment="cups-devel is &lt;1.3.9-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059007" version="1" comment="cups-libs-32bit is &lt;1.3.9-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059008" version="1" comment="cups-libs-64bit is &lt;1.3.9-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059009" version="1" comment="cups-libs is &lt;1.3.9-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059010" version="1" comment="cups is &lt;1.3.9-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059415" version="1" comment="libfreebl3-32bit is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059547" version="1" comment="libfreebl3-64bit is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059417" version="1" comment="libfreebl3 is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059418" version="1" comment="mozilla-nss-32bit is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059548" version="1" comment="mozilla-nss-64bit is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059431" version="1" comment="mozilla-nss-devel is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059419" version="1" comment="mozilla-nss-tools is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059421" version="1" comment="mozilla-nss is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064425" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b20.1.9.1-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064426" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b20.1.9.1-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064427" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6.0.0_b20.1.9.1-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064428" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.6.0.0_b20.1.9.1-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064429" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6.0.0_b20.1.9.1-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064430" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b20.1.9.1-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060008" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b17-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060009" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b17-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060010" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6.0.0_b17-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060011" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.6.0.0_b17-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060012" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6.0.0_b17-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060013" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b17-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059477" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059495" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059496" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059478" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059498" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059479" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059481" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059619" version="1" comment="python-xpcom190 is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063824" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063826" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063827" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063828" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063829" version="1" comment="java-1_6_0-sun-src is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063830" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059603" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059604" version="1" comment="MozillaFirefox-translations-common is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059605" version="1" comment="MozillaFirefox-translations-other is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059483" version="1" comment="MozillaFirefox is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059645" version="1" comment="autoconf213 is &lt;2.13-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059646" version="1" comment="beagle-devel is &lt;0.3.8-46.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059647" version="1" comment="beagle-epiphany is &lt;0.3.8-46.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059648" version="1" comment="beagle-evolution is &lt;0.3.8-46.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059649" version="1" comment="beagle-firefox is &lt;0.3.8-46.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059650" version="1" comment="beagle-google is &lt;0.3.8-46.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059651" version="1" comment="beagle-gui is &lt;0.3.8-46.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059652" version="1" comment="beagle-lang is &lt;0.3.8-46.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059653" version="1" comment="beagle-thunderbird is &lt;0.3.8-46.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059654" version="1" comment="beagle is &lt;0.3.8-46.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059655" version="1" comment="mhtml-firefox is &lt;0.5-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059484" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059500" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059501" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059485" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059606" version="1" comment="mozilla-xulrunner191-translations-common is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059607" version="1" comment="mozilla-xulrunner191-translations-other is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059488" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059608" version="1" comment="python-xpcom191 is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064846" version="1" comment="gnutls is &lt;2.4.1-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064847" version="1" comment="libgnutls-devel is &lt;2.4.1-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064848" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064849" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064850" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064851" version="1" comment="libgnutls26-64bit is &lt;2.4.1-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064852" version="1" comment="libgnutls26 is &lt;2.4.1-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056260" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056261" version="1" comment="compat-openssl097g-64bit is &lt;0.9.7g-146.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056262" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059656" version="1" comment="MozillaFirefox-branding-openSUSE is &lt;3.5-10.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059302" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059304" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059305" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059306" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059307" version="1" comment="java-1_6_0-sun-src is &lt;1.6.0.u19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059308" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056305" version="1" comment="libopenssl-devel is &lt;0.9.8h-28.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056306" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-28.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056307" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8h-28.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056308" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-28.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056309" version="1" comment="openssl-certs is &lt;0.9.8h-25.2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056310" version="1" comment="openssl-doc is &lt;0.9.8h-28.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056311" version="1" comment="openssl is &lt;0.9.8h-28.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065310" version="1" comment="gnutls is &lt;2.4.1-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065311" version="1" comment="libgnutls-devel is &lt;2.4.1-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065312" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065313" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065314" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065315" version="1" comment="libgnutls26-64bit is &lt;2.4.1-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065316" version="1" comment="libgnutls26 is &lt;2.4.1-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057244" version="1" comment="expat is &lt;2.0.1-88.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057245" version="1" comment="libexpat-devel is &lt;2.0.1-88.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057246" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057247" version="1" comment="libexpat1-64bit is &lt;2.0.1-88.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057248" version="1" comment="libexpat1 is &lt;2.0.1-88.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056843" version="1" comment="expat is &lt;2.0.1-88.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056844" version="1" comment="libexpat-devel is &lt;2.0.1-88.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056845" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056846" version="1" comment="libexpat1-64bit is &lt;2.0.1-88.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056847" version="1" comment="libexpat1 is &lt;2.0.1-88.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056877" version="1" comment="pyxml is &lt;0.8.4-194.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057196" version="1" comment="ntp-doc is &lt;4.2.4p6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057197" version="1" comment="ntp is &lt;4.2.4p6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055350" version="1" comment="aria2 is &lt;0.16.0-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058349" version="1" comment="unbound-devel is &lt;1.0.0-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058350" version="1" comment="unbound is &lt;1.0.0-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056085" version="1" comment="xpdf-tools is &lt;3.02-97.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056086" version="1" comment="xpdf is &lt;3.02-97.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056245" version="1" comment="kdegraphics3-pdf is &lt;3.5.10-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056321" version="1" comment="qemu is &lt;0.10.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056337" version="1" comment="kvm-kmp-default is &lt;78.2.6.30.1_2.6.27.37_0.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056338" version="1" comment="kvm-kmp-pae is &lt;78.2.6.30.1_2.6.27.37_0.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056339" version="1" comment="kvm-kmp-trace is &lt;78.2.6.30.1_2.6.27.37_0.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056340" version="1" comment="kvm is &lt;78.0.10.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055769" version="1" comment="viewvc is &lt;1.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056807" version="1" comment="perl-HTML-Parser is &lt;3.56-1.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061928" version="1" comment="squidGuard is &lt;1.3-57.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056056" version="1" comment="expat is &lt;2.0.1-88.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056057" version="1" comment="libexpat-devel is &lt;2.0.1-88.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056058" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056059" version="1" comment="libexpat1-64bit is &lt;2.0.1-88.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056060" version="1" comment="libexpat1 is &lt;2.0.1-88.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057135" version="1" comment="libltdl7-32bit is &lt;2.2.6-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057136" version="1" comment="libltdl7-64bit is &lt;2.2.6-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057137" version="1" comment="libltdl7 is &lt;2.2.6-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057138" version="1" comment="libtool-32bit is &lt;2.2.6-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057139" version="1" comment="libtool-64bit is &lt;2.2.6-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057140" version="1" comment="libtool is &lt;2.2.6-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056944" version="1" comment="flash-player is &lt;10.0.42.34-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056113" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update22-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056114" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update22-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056115" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update22-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056116" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update22-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056117" version="1" comment="java-1_5_0-sun-src is &lt;1.5.0_update22-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056118" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update22-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056292" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u17-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056293" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u17-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056294" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u17-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056295" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u17-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056296" version="1" comment="java-1_6_0-sun-src is &lt;1.6.0.u17-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056297" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u17-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058516" version="1" comment="kernel-debug-base is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058517" version="1" comment="kernel-debug-extra is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058518" version="1" comment="kernel-debug is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058492" version="1" comment="kernel-default-base is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058512" version="1" comment="kernel-default-extra is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058493" version="1" comment="kernel-default is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058519" version="1" comment="kernel-docs is &lt;2.6.3-3.13.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058507" version="1" comment="kernel-kdump is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058501" version="1" comment="kernel-pae-base is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058515" version="1" comment="kernel-pae-extra is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058502" version="1" comment="kernel-pae is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058508" version="1" comment="kernel-ppc64-base is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058520" version="1" comment="kernel-ppc64-extra is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058509" version="1" comment="kernel-ppc64 is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058521" version="1" comment="kernel-ps3 is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058494" version="1" comment="kernel-source is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058495" version="1" comment="kernel-syms is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058522" version="1" comment="kernel-trace-base is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058523" version="1" comment="kernel-trace-extra is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058524" version="1" comment="kernel-trace is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058525" version="1" comment="kernel-vanilla is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058497" version="1" comment="kernel-xen-base is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058513" version="1" comment="kernel-xen-extra is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058498" version="1" comment="kernel-xen is &lt;2.6.27.45-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057512" version="1" comment="virtualbox-ose-guest-tools is &lt;2.0.6-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057513" version="1" comment="virtualbox-ose-kmp-debug is &lt;2.0.6_2.6.27.42_0.1-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057514" version="1" comment="virtualbox-ose-kmp-default is &lt;2.0.6_2.6.27.42_0.1-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057515" version="1" comment="virtualbox-ose-kmp-pae is &lt;2.0.6_2.6.27.42_0.1-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057516" version="1" comment="virtualbox-ose-kmp-trace is &lt;2.0.6_2.6.27.42_0.1-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057517" version="1" comment="virtualbox-ose is &lt;2.0.6-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057518" version="1" comment="xorg-x11-driver-virtualbox-ose is &lt;2.0.6-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057379" version="1" comment="msmtp is &lt;1.4.16-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057440" version="1" comment="acroread is &lt;9.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056983" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.16-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056984" version="1" comment="MozillaFirefox-translations is &lt;3.0.16-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056985" version="1" comment="MozillaFirefox is &lt;3.0.16-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056893" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056953" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056954" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056894" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056956" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056895" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056897" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056986" version="1" comment="python-xpcom190 is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060151" version="1" comment="libmikmod-32bit is &lt;3.1.11a-71.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060152" version="1" comment="libmikmod-64bit is &lt;3.1.11a-71.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060153" version="1" comment="libmikmod-devel is &lt;3.1.11a-71.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060154" version="1" comment="libmikmod is &lt;3.1.11a-71.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057909" version="1" comment="pdns-recursor is &lt;3.1.7-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057630" version="1" comment="libthai-devel is &lt;0.1.9-9.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057631" version="1" comment="libthai is &lt;0.1.9-9.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056469" version="1" comment="bind-chrootenv is &lt;9.5.0P2-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056470" version="1" comment="bind-devel is &lt;9.5.0P2-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056471" version="1" comment="bind-doc is &lt;9.5.0P2-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056472" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056473" version="1" comment="bind-libs-64bit is &lt;9.5.0P2-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056474" version="1" comment="bind-libs is &lt;9.5.0P2-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056475" version="1" comment="bind-utils is &lt;9.5.0P2-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056476" version="1" comment="bind is &lt;9.5.0P2-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057458" version="1" comment="bind-chrootenv is &lt;9.5.0P2-18.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057459" version="1" comment="bind-devel is &lt;9.5.0P2-18.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057460" version="1" comment="bind-doc is &lt;9.5.0P2-18.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057461" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-18.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057462" version="1" comment="bind-libs-64bit is &lt;9.5.0P2-18.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057463" version="1" comment="bind-libs is &lt;9.5.0P2-18.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057464" version="1" comment="bind-utils is &lt;9.5.0P2-18.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057465" version="1" comment="bind is &lt;9.5.0P2-18.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064012" version="1" comment="php5-pear-mail is &lt;1.1.14-1.135.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057276" version="1" comment="postgresql-contrib is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057333" version="1" comment="postgresql-devel is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057277" version="1" comment="postgresql-docs is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057278" version="1" comment="postgresql-libs-32bit is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057334" version="1" comment="postgresql-libs-64bit is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057280" version="1" comment="postgresql-libs is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057335" version="1" comment="postgresql-plperl is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057336" version="1" comment="postgresql-plpython is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057337" version="1" comment="postgresql-pltcl is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057281" version="1" comment="postgresql-server is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057282" version="1" comment="postgresql is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057633" version="1" comment="NetworkManager-gnome is &lt;0.7.0.r1053-11.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061932" version="1" comment="ghostscript-devel is &lt;8.62-31.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061933" version="1" comment="ghostscript-fonts-other is &lt;8.62-31.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061934" version="1" comment="ghostscript-fonts-rus is &lt;8.62-31.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061935" version="1" comment="ghostscript-fonts-std is &lt;8.62-31.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061936" version="1" comment="ghostscript-ijs-devel is &lt;8.62-31.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061937" version="1" comment="ghostscript-library is &lt;8.62-31.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061938" version="1" comment="ghostscript-omni is &lt;8.62-31.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061939" version="1" comment="ghostscript-x11 is &lt;8.62-31.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061940" version="1" comment="libgimpprint-devel is &lt;4.2.7-31.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061941" version="1" comment="libgimpprint is &lt;4.2.7-31.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058607" version="1" comment="libnetpbm-devel is &lt;10.26.44-98.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058608" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-98.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058609" version="1" comment="libnetpbm10-64bit is &lt;10.26.44-98.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058610" version="1" comment="libnetpbm10 is &lt;10.26.44-98.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058611" version="1" comment="netpbm is &lt;10.26.44-98.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057852" version="1" comment="moodle-af is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057853" version="1" comment="moodle-ar is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057854" version="1" comment="moodle-be is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057855" version="1" comment="moodle-bg is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057856" version="1" comment="moodle-bs is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057857" version="1" comment="moodle-ca is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057858" version="1" comment="moodle-cs is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057859" version="1" comment="moodle-da is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057860" version="1" comment="moodle-de is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057861" version="1" comment="moodle-de_du is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057862" version="1" comment="moodle-el is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057863" version="1" comment="moodle-es is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057864" version="1" comment="moodle-et is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057865" version="1" comment="moodle-eu is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057866" version="1" comment="moodle-fa is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057867" version="1" comment="moodle-fi is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057868" version="1" comment="moodle-fr is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057869" version="1" comment="moodle-ga is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057870" version="1" comment="moodle-gl is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057871" version="1" comment="moodle-he is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057872" version="1" comment="moodle-hi is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057873" version="1" comment="moodle-hr is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057874" version="1" comment="moodle-hu is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057875" version="1" comment="moodle-id is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057876" version="1" comment="moodle-is is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057877" version="1" comment="moodle-it is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057878" version="1" comment="moodle-ja is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057879" version="1" comment="moodle-ka is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057880" version="1" comment="moodle-km is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057881" version="1" comment="moodle-kn is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057882" version="1" comment="moodle-ko is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057883" version="1" comment="moodle-lt is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057884" version="1" comment="moodle-lv is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057885" version="1" comment="moodle-mi_tn is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057886" version="1" comment="moodle-ms is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057887" version="1" comment="moodle-nl is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057888" version="1" comment="moodle-nn is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057889" version="1" comment="moodle-no is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057890" version="1" comment="moodle-pl is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057891" version="1" comment="moodle-pt is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057892" version="1" comment="moodle-ro is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057893" version="1" comment="moodle-ru is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057894" version="1" comment="moodle-sk is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057895" version="1" comment="moodle-sl is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057896" version="1" comment="moodle-so is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057897" version="1" comment="moodle-sq is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057898" version="1" comment="moodle-sr is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057899" version="1" comment="moodle-sv is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057900" version="1" comment="moodle-th is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057901" version="1" comment="moodle-tl is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057902" version="1" comment="moodle-tr is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057903" version="1" comment="moodle-uk is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057904" version="1" comment="moodle-vi is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057905" version="1" comment="moodle-zh_cn is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057906" version="1" comment="moodle is &lt;1.9.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057475" version="1" comment="libopenssl-devel is &lt;0.9.8h-28.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057476" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-28.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057477" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8h-28.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057478" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-28.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057479" version="1" comment="openssl-doc is &lt;0.9.8h-28.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057480" version="1" comment="openssl is &lt;0.9.8h-28.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057640" version="1" comment="acl is &lt;2.2.47-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057641" version="1" comment="libacl-32bit is &lt;2.2.47-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057642" version="1" comment="libacl-64bit is &lt;2.2.47-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057643" version="1" comment="libacl-devel is &lt;2.2.47-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057644" version="1" comment="libacl is &lt;2.2.47-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058480" version="1" comment="rmail is &lt;8.14.3-50.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058481" version="1" comment="sendmail-devel is &lt;8.14.3-50.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058482" version="1" comment="sendmail is &lt;8.14.3-50.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057410" version="1" comment="transmission-gtk is &lt;1.34-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057411" version="1" comment="transmission-lang is &lt;1.34-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057412" version="1" comment="transmission is &lt;1.34-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058562" version="1" comment="finch-devel is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058563" version="1" comment="finch is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058564" version="1" comment="libpurple-devel is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058565" version="1" comment="libpurple-lang is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058566" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058567" version="1" comment="libpurple-mono is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058568" version="1" comment="libpurple is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058569" version="1" comment="pidgin-devel is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058570" version="1" comment="pidgin is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059837" version="1" comment="clamav-db is &lt;0.96-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059838" version="1" comment="clamav is &lt;0.96-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059522" version="1" comment="viewvc is &lt;1.0.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059433" version="1" comment="viewvc is &lt;1.0.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060823" version="1" comment="puppet-server is &lt;0.24.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060824" version="1" comment="puppet is &lt;0.24.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065116" version="1" comment="MozillaThunderbird-devel is &lt;3.0.11-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065117" version="1" comment="MozillaThunderbird-translations-common is &lt;3.0.11-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065118" version="1" comment="MozillaThunderbird-translations-other is &lt;3.0.11-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065119" version="1" comment="MozillaThunderbird is &lt;3.0.11-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065120" version="1" comment="enigmail is &lt;1.0.1-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065250" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065251" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065252" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065253" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065254" version="1" comment="mozilla-xulrunner191-translations-common is &lt;1.9.1.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065255" version="1" comment="mozilla-xulrunner191-translations-other is &lt;1.9.1.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065256" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065257" version="1" comment="python-xpcom191 is &lt;1.9.1.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065258" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065259" version="1" comment="MozillaFirefox-translations-common is &lt;3.6.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065260" version="1" comment="MozillaFirefox-translations-other is &lt;3.6.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065261" version="1" comment="MozillaFirefox is &lt;3.6.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065262" version="1" comment="mozilla-js192-32bit is &lt;1.9.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065263" version="1" comment="mozilla-js192 is &lt;1.9.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065264" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065265" version="1" comment="mozilla-xulrunner192-buildsymbols is &lt;1.9.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065266" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065267" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065268" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065269" version="1" comment="mozilla-xulrunner192-translations-common-32bit is &lt;1.9.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065270" version="1" comment="mozilla-xulrunner192-translations-common is &lt;1.9.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065271" version="1" comment="mozilla-xulrunner192-translations-other-32bit is &lt;1.9.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065272" version="1" comment="mozilla-xulrunner192-translations-other is &lt;1.9.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065273" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065121" version="1" comment="seamonkey-dom-inspector is &lt;2.0.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065122" version="1" comment="seamonkey-irc is &lt;2.0.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065123" version="1" comment="seamonkey-venkman is &lt;2.0.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065124" version="1" comment="seamonkey is &lt;2.0.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057994" version="1" comment="flash-player is &lt;10.0.45.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058543" version="1" comment="acroread-cmaps is &lt;9.3.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058544" version="1" comment="acroread-fonts-ja is &lt;9.3.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058545" version="1" comment="acroread-fonts-ko is &lt;9.3.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058546" version="1" comment="acroread-fonts-zh_CN is &lt;9.3.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058547" version="1" comment="acroread-fonts-zh_TW is &lt;9.3.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058548" version="1" comment="acroread is &lt;9.3.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059796" version="1" comment="acroread-cmaps is &lt;9.3.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059797" version="1" comment="acroread-fonts-ja is &lt;9.3.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059798" version="1" comment="acroread-fonts-ko is &lt;9.3.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059799" version="1" comment="acroread-fonts-zh_CN is &lt;9.3.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059800" version="1" comment="acroread-fonts-zh_TW is &lt;9.3.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059801" version="1" comment="acroread is &lt;9.3.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060577" version="1" comment="libpng-devel-32bit is &lt;1.2.31-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060578" version="1" comment="libpng-devel-64bit is &lt;1.2.31-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060579" version="1" comment="libpng-devel is &lt;1.2.31-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060580" version="1" comment="libpng12-0-32bit is &lt;1.2.31-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060581" version="1" comment="libpng12-0-64bit is &lt;1.2.31-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060582" version="1" comment="libpng12-0 is &lt;1.2.31-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060583" version="1" comment="libpng3 is &lt;1.2.31-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061978" version="1" comment="flash-player is &lt;10.1.82.76-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062172" version="1" comment="acroread-cmaps is &lt;9.3.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062173" version="1" comment="acroread-fonts-ja is &lt;9.3.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062174" version="1" comment="acroread-fonts-ko is &lt;9.3.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062175" version="1" comment="acroread-fonts-zh_CN is &lt;9.3.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062176" version="1" comment="acroread-fonts-zh_TW is &lt;9.3.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062177" version="1" comment="acroread is &lt;9.3.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062094" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.12-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062095" version="1" comment="libldap-2_4-2-64bit is &lt;2.4.12-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062096" version="1" comment="libldap-2_4-2 is &lt;2.4.12-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062097" version="1" comment="openldap2-back-meta is &lt;2.4.12-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062098" version="1" comment="openldap2-back-perl is &lt;2.4.12-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062099" version="1" comment="openldap2-client is &lt;2.4.12-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062100" version="1" comment="openldap2-devel-32bit is &lt;2.4.12-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062101" version="1" comment="openldap2-devel-64bit is &lt;2.4.12-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062102" version="1" comment="openldap2-devel is &lt;2.4.12-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062103" version="1" comment="openldap2 is &lt;2.4.12-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057683" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057684" version="1" comment="MozillaFirefox-translations is &lt;3.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057685" version="1" comment="MozillaFirefox is &lt;3.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057537" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057655" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057656" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057538" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057658" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057539" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057541" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057686" version="1" comment="python-xpcom190 is &lt;1.9.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057953" version="1" comment="gnome-screensaver-lang is &lt;2.24.0-7.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057954" version="1" comment="gnome-screensaver is &lt;2.24.0-7.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057752" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057753" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057754" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057755" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057756" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057757" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057758" version="1" comment="lighttpd is &lt;1.4.20-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061558" version="1" comment="OpenOffice_org-base-drivers-postgresql is &lt;3.0.0.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061559" version="1" comment="OpenOffice_org-gnome is &lt;3.0.0.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061560" version="1" comment="OpenOffice_org-kde is &lt;3.0.0.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061561" version="1" comment="OpenOffice_org-libs-core-devel is &lt;3.0.0.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061562" version="1" comment="OpenOffice_org-libs-core-l10n-prebuilt is &lt;3.0.0.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061563" version="1" comment="OpenOffice_org-libs-core is &lt;3.0.0.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061564" version="1" comment="OpenOffice_org-mailmerge is &lt;3.0.0.9-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060586" version="1" comment="apache2-mod_php5 is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060587" version="1" comment="php5-bcmath is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060588" version="1" comment="php5-bz2 is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060589" version="1" comment="php5-calendar is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060590" version="1" comment="php5-ctype is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060591" version="1" comment="php5-curl is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060592" version="1" comment="php5-dba is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060593" version="1" comment="php5-dbase is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060594" version="1" comment="php5-devel is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060595" version="1" comment="php5-dom is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060596" version="1" comment="php5-exif is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060597" version="1" comment="php5-fastcgi is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060598" version="1" comment="php5-ftp is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060599" version="1" comment="php5-gd is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060600" version="1" comment="php5-gettext is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060601" version="1" comment="php5-gmp is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060602" version="1" comment="php5-hash is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060603" version="1" comment="php5-iconv is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060604" version="1" comment="php5-imap is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060605" version="1" comment="php5-json is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060606" version="1" comment="php5-ldap is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060607" version="1" comment="php5-mbstring is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060608" version="1" comment="php5-mcrypt is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060609" version="1" comment="php5-mysql is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060610" version="1" comment="php5-ncurses is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060611" version="1" comment="php5-odbc is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060612" version="1" comment="php5-openssl is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060613" version="1" comment="php5-pcntl is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060614" version="1" comment="php5-pdo is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060615" version="1" comment="php5-pear is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060616" version="1" comment="php5-pgsql is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060617" version="1" comment="php5-posix is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060618" version="1" comment="php5-pspell is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060619" version="1" comment="php5-readline is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060620" version="1" comment="php5-shmop is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060621" version="1" comment="php5-snmp is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060622" version="1" comment="php5-soap is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060623" version="1" comment="php5-sockets is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060624" version="1" comment="php5-sqlite is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060625" version="1" comment="php5-suhosin is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060626" version="1" comment="php5-sysvmsg is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060627" version="1" comment="php5-sysvsem is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060628" version="1" comment="php5-sysvshm is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060629" version="1" comment="php5-tidy is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060630" version="1" comment="php5-tokenizer is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060631" version="1" comment="php5-wddx is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060632" version="1" comment="php5-xmlreader is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060633" version="1" comment="php5-xmlrpc is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060634" version="1" comment="php5-xmlwriter is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060635" version="1" comment="php5-xsl is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060636" version="1" comment="php5-zip is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060637" version="1" comment="php5-zlib is &lt;5.2.13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063229" version="1" comment="bzip2-doc is &lt;1.0.5-34.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063230" version="1" comment="bzip2 is &lt;1.0.5-34.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063231" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063232" version="1" comment="libbz2-1-64bit is &lt;1.0.5-34.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063233" version="1" comment="libbz2-1 is &lt;1.0.5-34.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063234" version="1" comment="libbz2-devel is &lt;1.0.5-34.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062683" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.249.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062684" version="1" comment="pcsc-lite-64bit is &lt;1.4.102-1.249.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062685" version="1" comment="pcsc-lite-devel is &lt;1.4.102-1.249.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062686" version="1" comment="pcsc-lite is &lt;1.4.102-1.249.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059956" version="1" comment="apache2-devel is &lt;2.2.10-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059957" version="1" comment="apache2-doc is &lt;2.2.10-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059958" version="1" comment="apache2-example-pages is &lt;2.2.10-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059959" version="1" comment="apache2-prefork is &lt;2.2.10-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059960" version="1" comment="apache2-utils is &lt;2.2.10-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059961" version="1" comment="apache2-worker is &lt;2.2.10-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059962" version="1" comment="apache2 is &lt;2.2.10-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058463" version="1" comment="gmime-devel is &lt;2.2.23-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058464" version="1" comment="gmime-doc is &lt;2.2.23-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058465" version="1" comment="gmime-sharp is &lt;2.2.23-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058466" version="1" comment="gmime is &lt;2.2.23-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058467" version="1" comment="libgmime-2_0-3 is &lt;2.2.23-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058940" version="1" comment="cron is &lt;4.1-194.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058648" version="1" comment="sudo is &lt;1.6.9p17-10.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059725" version="1" comment="fileshareset is &lt;2.0-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059726" version="1" comment="kdebase3-32bit is &lt;3.5.10-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059727" version="1" comment="kdebase3-beagle is &lt;3.5.10-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059728" version="1" comment="kdebase3-devel is &lt;3.5.10-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059729" version="1" comment="kdebase3-extra is &lt;3.5.10-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059730" version="1" comment="kdebase3-kdm is &lt;3.5.10-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059731" version="1" comment="kdebase3-nsplugin is &lt;3.5.10-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059732" version="1" comment="kdebase3-runtime-32bit is &lt;3.5.10-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059733" version="1" comment="kdebase3-runtime is &lt;3.5.10-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059734" version="1" comment="kdebase3-samba is &lt;3.5.10-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059735" version="1" comment="kdebase3-session is &lt;3.5.10-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059736" version="1" comment="kdebase3 is &lt;3.5.10-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059737" version="1" comment="misc-console-font is &lt;3.5.10-17.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059774" version="1" comment="kde4-kdm-branding-upstream is &lt;4.1.3-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059775" version="1" comment="kde4-kdm is &lt;4.1.3-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059776" version="1" comment="kde4-kgreeter-plugins is &lt;4.1.3-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059777" version="1" comment="kde4-kwin is &lt;4.1.3-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059778" version="1" comment="kdebase4-workspace-branding-upstream is &lt;4.1.3-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059779" version="1" comment="kdebase4-workspace-devel is &lt;4.1.3-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059780" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.1.3-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059781" version="1" comment="kdebase4-workspace is &lt;4.1.3-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061291" version="1" comment="otrs is &lt;2.2.6-45.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064805" version="1" comment="cups-client is &lt;1.3.9-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064806" version="1" comment="cups-devel is &lt;1.3.9-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064807" version="1" comment="cups-libs-32bit is &lt;1.3.9-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064808" version="1" comment="cups-libs-64bit is &lt;1.3.9-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064809" version="1" comment="cups-libs is &lt;1.3.9-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064810" version="1" comment="cups is &lt;1.3.9-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059146" version="1" comment="cifs-mount is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059147" version="1" comment="ldapsmb is &lt;1.34b-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059148" version="1" comment="libnetapi-devel is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059149" version="1" comment="libnetapi0 is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059150" version="1" comment="libsmbclient-devel is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059151" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059152" version="1" comment="libsmbclient0-64bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059153" version="1" comment="libsmbclient0 is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059154" version="1" comment="libsmbsharemodes-devel is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059155" version="1" comment="libsmbsharemodes0 is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059156" version="1" comment="libtalloc-devel is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059157" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059158" version="1" comment="libtalloc1-64bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059159" version="1" comment="libtalloc1 is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059160" version="1" comment="libtdb-devel is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059161" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059162" version="1" comment="libtdb1-64bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059163" version="1" comment="libtdb1 is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059164" version="1" comment="libwbclient-devel is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059165" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059166" version="1" comment="libwbclient0-64bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059167" version="1" comment="libwbclient0 is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059168" version="1" comment="samba-32bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059169" version="1" comment="samba-64bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059170" version="1" comment="samba-client-32bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059171" version="1" comment="samba-client-64bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059172" version="1" comment="samba-client is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059173" version="1" comment="samba-devel is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059174" version="1" comment="samba-krb-printing is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059175" version="1" comment="samba-vscan is &lt;0.3.6b-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059176" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059177" version="1" comment="samba-winbind-64bit is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059178" version="1" comment="samba-winbind is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059179" version="1" comment="samba is &lt;3.2.7-11.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060039" version="1" comment="tar is &lt;1.20-23.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059591" version="1" comment="krb5-32bit is &lt;1.6.3-132.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059592" version="1" comment="krb5-64bit is &lt;1.6.3-132.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059593" version="1" comment="krb5-apps-clients is &lt;1.6.3-132.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059594" version="1" comment="krb5-apps-servers is &lt;1.6.3-132.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059595" version="1" comment="krb5-client is &lt;1.6.3-132.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059596" version="1" comment="krb5-devel-32bit is &lt;1.6.3-132.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059597" version="1" comment="krb5-devel-64bit is &lt;1.6.3-132.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059598" version="1" comment="krb5-devel is &lt;1.6.3-132.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059599" version="1" comment="krb5-server is &lt;1.6.3-132.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059600" version="1" comment="krb5 is &lt;1.6.3-132.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061279" version="1" comment="opera is &lt;10.60-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061815" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061816" version="1" comment="MozillaFirefox-translations-common is &lt;3.5.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061817" version="1" comment="MozillaFirefox-translations-other is &lt;3.5.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061809" version="1" comment="MozillaFirefox is &lt;3.5.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061810" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061818" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061819" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061811" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061820" version="1" comment="mozilla-xulrunner191-translations-common is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061821" version="1" comment="mozilla-xulrunner191-translations-other is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061814" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061822" version="1" comment="python-xpcom191 is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059246" version="1" comment="gnome-screensaver-lang is &lt;2.24.0-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059247" version="1" comment="gnome-screensaver is &lt;2.24.0-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061271" version="1" comment="postgresql-contrib is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061293" version="1" comment="postgresql-devel is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061272" version="1" comment="postgresql-docs is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061273" version="1" comment="postgresql-libs-32bit is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061315" version="1" comment="postgresql-libs-64bit is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061275" version="1" comment="postgresql-libs is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061316" version="1" comment="postgresql-plperl is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061317" version="1" comment="postgresql-plpython is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061318" version="1" comment="postgresql-pltcl is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061276" version="1" comment="postgresql-server is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061277" version="1" comment="postgresql is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059210" version="1" comment="viewvc is &lt;1.0.10-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060450" version="1" comment="texlive-arab is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060451" version="1" comment="texlive-bin is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060452" version="1" comment="texlive-cjk is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060453" version="1" comment="texlive-context is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060454" version="1" comment="texlive-devel is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060455" version="1" comment="texlive-doc is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060456" version="1" comment="texlive-dvilj is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060457" version="1" comment="texlive-jadetex is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060458" version="1" comment="texlive-latex-doc is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060459" version="1" comment="texlive-latex is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060460" version="1" comment="texlive-metapost is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060461" version="1" comment="texlive-musictex is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060462" version="1" comment="texlive-nfs is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060463" version="1" comment="texlive-omega is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060464" version="1" comment="texlive-ppower4 is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060465" version="1" comment="texlive-tex4ht is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060466" version="1" comment="texlive-tools is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060467" version="1" comment="texlive-xetex is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060468" version="1" comment="texlive-xmltex is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060469" version="1" comment="texlive is &lt;2007-219.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062614" version="1" comment="iscsitarget-kmp-debug is &lt;0.4.15_2.6.27.48_0.2-89.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062615" version="1" comment="iscsitarget-kmp-default is &lt;0.4.15_2.6.27.48_0.2-89.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062616" version="1" comment="iscsitarget-kmp-pae is &lt;0.4.15_2.6.27.48_0.2-89.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062617" version="1" comment="iscsitarget-kmp-trace is &lt;0.4.15_2.6.27.48_0.2-89.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062618" version="1" comment="iscsitarget-kmp-xen is &lt;0.4.15_2.6.27.48_0.2-89.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062619" version="1" comment="iscsitarget is &lt;0.4.15-89.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062621" version="1" comment="tgt is &lt;0.9.0-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059437" version="1" comment="transmission-gtk is &lt;1.34-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059438" version="1" comment="transmission-lang is &lt;1.34-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059439" version="1" comment="transmission is &lt;1.34-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053220" version="1" comment="cifs-mount is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061031" version="1" comment="ldapsmb is &lt;1.34b-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053250" version="1" comment="libnetapi-devel is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053251" version="1" comment="libnetapi0 is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053252" version="1" comment="libsmbclient-devel is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053222" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061032" version="1" comment="libsmbclient0-64bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053224" version="1" comment="libsmbclient0 is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053253" version="1" comment="libsmbsharemodes-devel is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053254" version="1" comment="libsmbsharemodes0 is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053255" version="1" comment="libtalloc-devel is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053225" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061033" version="1" comment="libtalloc1-64bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053227" version="1" comment="libtalloc1 is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053256" version="1" comment="libtdb-devel is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053228" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061034" version="1" comment="libtdb1-64bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053230" version="1" comment="libtdb1 is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053257" version="1" comment="libwbclient-devel is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053231" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061035" version="1" comment="libwbclient0-64bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053233" version="1" comment="libwbclient0 is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053234" version="1" comment="samba-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061036" version="1" comment="samba-64bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053235" version="1" comment="samba-client-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061037" version="1" comment="samba-client-64bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053237" version="1" comment="samba-client is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053258" version="1" comment="samba-devel is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053238" version="1" comment="samba-krb-printing is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061038" version="1" comment="samba-vscan is &lt;0.3.6b-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053239" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061039" version="1" comment="samba-winbind-64bit is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053241" version="1" comment="samba-winbind is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053243" version="1" comment="samba is &lt;3.2.7-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060669" version="1" comment="ncpfs-32bit is &lt;2.2.6-147.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060670" version="1" comment="ncpfs-64bit is &lt;2.2.6-147.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060671" version="1" comment="ncpfs-devel is &lt;2.2.6-147.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060672" version="1" comment="ncpfs is &lt;2.2.6-147.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060036" version="1" comment="fuse-devel is &lt;2.7.2-61.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060019" version="1" comment="fuse is &lt;2.7.2-61.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060020" version="1" comment="libfuse2 is &lt;2.7.2-61.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059808" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059810" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059811" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059812" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059813" version="1" comment="java-1_6_0-sun-src is &lt;1.6.0.u20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059814" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060799" version="1" comment="memcached is &lt;1.2.6-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060016" version="1" comment="irssi-devel is &lt;0.8.12-30.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060017" version="1" comment="irssi is &lt;0.8.12-30.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062701" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-16.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062702" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-16.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062703" version="1" comment="tomcat6-javadoc is &lt;6.0.18-16.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062704" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-16.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062705" version="1" comment="tomcat6-lib is &lt;6.0.18-16.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062706" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-16.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062707" version="1" comment="tomcat6-webapps is &lt;6.0.18-16.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062708" version="1" comment="tomcat6 is &lt;6.0.18-16.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062019" version="1" comment="perl-32bit is &lt;5.10.0-62.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062020" version="1" comment="perl-64bit is &lt;5.10.0-62.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062021" version="1" comment="perl-base-32bit is &lt;5.10.0-62.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062022" version="1" comment="perl-base-64bit is &lt;5.10.0-62.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062023" version="1" comment="perl-base is &lt;5.10.0-62.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062024" version="1" comment="perl-doc is &lt;5.10.0-62.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062025" version="1" comment="perl is &lt;5.10.0-62.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064456" version="1" comment="gdm-branding-upstream is &lt;2.24.0-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064457" version="1" comment="gdm-lang is &lt;2.24.0-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064458" version="1" comment="gdm is &lt;2.24.0-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060314" version="1" comment="libesmtp-devel is &lt;1.0.4-157.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060315" version="1" comment="libesmtp is &lt;1.0.4-157.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062307" version="1" comment="libpng-devel-32bit is &lt;1.2.31-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062308" version="1" comment="libpng-devel-64bit is &lt;1.2.31-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062309" version="1" comment="libpng-devel is &lt;1.2.31-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062310" version="1" comment="libpng12-0-32bit is &lt;1.2.31-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062311" version="1" comment="libpng12-0-64bit is &lt;1.2.31-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062312" version="1" comment="libpng12-0 is &lt;1.2.31-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062313" version="1" comment="libpng3 is &lt;1.2.31-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061201" version="1" comment="acroread-cmaps is &lt;9.3.3-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061202" version="1" comment="acroread-fonts-ja is &lt;9.3.3-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061203" version="1" comment="acroread-fonts-ko is &lt;9.3.3-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061204" version="1" comment="acroread-fonts-zh_CN is &lt;9.3.3-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061205" version="1" comment="acroread-fonts-zh_TW is &lt;9.3.3-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061206" version="1" comment="acroread is &lt;9.3.3-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060785" version="1" comment="krb5-32bit is &lt;1.6.3-132.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060786" version="1" comment="krb5-64bit is &lt;1.6.3-132.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060787" version="1" comment="krb5-apps-clients is &lt;1.6.3-132.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060788" version="1" comment="krb5-apps-servers is &lt;1.6.3-132.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060789" version="1" comment="krb5-client is &lt;1.6.3-132.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060790" version="1" comment="krb5-devel-32bit is &lt;1.6.3-132.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060791" version="1" comment="krb5-devel-64bit is &lt;1.6.3-132.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060792" version="1" comment="krb5-devel is &lt;1.6.3-132.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060793" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-132.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060794" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-132.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060795" version="1" comment="krb5-server is &lt;1.6.3-132.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060796" version="1" comment="krb5 is &lt;1.6.3-132.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065125" version="1" comment="krb5-32bit is &lt;1.6.3-132.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065126" version="1" comment="krb5-64bit is &lt;1.6.3-132.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065127" version="1" comment="krb5-apps-clients is &lt;1.6.3-132.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065128" version="1" comment="krb5-apps-servers is &lt;1.6.3-132.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065129" version="1" comment="krb5-client is &lt;1.6.3-132.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065130" version="1" comment="krb5-devel-32bit is &lt;1.6.3-132.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065131" version="1" comment="krb5-devel-64bit is &lt;1.6.3-132.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065132" version="1" comment="krb5-devel is &lt;1.6.3-132.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065133" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-132.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065134" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-132.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065135" version="1" comment="krb5-server is &lt;1.6.3-132.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065136" version="1" comment="krb5 is &lt;1.6.3-132.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060867" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060868" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060869" version="1" comment="libtiff-devel is &lt;3.8.2-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060870" version="1" comment="libtiff3-32bit is &lt;3.8.2-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060871" version="1" comment="libtiff3-64bit is &lt;3.8.2-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060872" version="1" comment="libtiff3 is &lt;3.8.2-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060873" version="1" comment="tiff is &lt;3.8.2-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065421" version="1" comment="wireshark-devel is &lt;1.4.2-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065422" version="1" comment="wireshark is &lt;1.4.2-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061059" version="1" comment="bytefx-data-mysql is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061060" version="1" comment="ibm-data-db2 is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061061" version="1" comment="mono-complete is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061062" version="1" comment="mono-core-32bit is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061063" version="1" comment="mono-core is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061064" version="1" comment="mono-data-firebird is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061065" version="1" comment="mono-data-oracle is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061066" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061067" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061068" version="1" comment="mono-data-sybase is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061069" version="1" comment="mono-data is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061070" version="1" comment="mono-devel is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061071" version="1" comment="mono-extras is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061072" version="1" comment="mono-jscript is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061073" version="1" comment="mono-locale-extras is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061074" version="1" comment="mono-nunit is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061075" version="1" comment="mono-web is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061076" version="1" comment="mono-winforms is &lt;2.0.1-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061077" version="1" comment="monodoc-core is &lt;2.0-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062622" version="1" comment="aria2 is &lt;0.16.0-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063151" version="1" comment="libgdiplus0 is &lt;2.0-11.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060210" version="1" comment="moodle-af is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060211" version="1" comment="moodle-ar is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060212" version="1" comment="moodle-be is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060213" version="1" comment="moodle-bg is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060214" version="1" comment="moodle-bs is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060215" version="1" comment="moodle-ca is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060216" version="1" comment="moodle-cs is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060217" version="1" comment="moodle-da is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060218" version="1" comment="moodle-de is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060219" version="1" comment="moodle-de_du is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060220" version="1" comment="moodle-el is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060221" version="1" comment="moodle-es is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060222" version="1" comment="moodle-et is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060223" version="1" comment="moodle-eu is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060224" version="1" comment="moodle-fa is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060225" version="1" comment="moodle-fi is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060226" version="1" comment="moodle-fr is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060227" version="1" comment="moodle-ga is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060228" version="1" comment="moodle-gl is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060229" version="1" comment="moodle-he is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060230" version="1" comment="moodle-hi is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060231" version="1" comment="moodle-hr is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060232" version="1" comment="moodle-hu is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060233" version="1" comment="moodle-id is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060234" version="1" comment="moodle-is is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060235" version="1" comment="moodle-it is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060236" version="1" comment="moodle-ja is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060237" version="1" comment="moodle-ka is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060238" version="1" comment="moodle-km is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060239" version="1" comment="moodle-kn is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060240" version="1" comment="moodle-ko is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060241" version="1" comment="moodle-lt is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060242" version="1" comment="moodle-lv is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060243" version="1" comment="moodle-mi_tn is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060244" version="1" comment="moodle-ms is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060245" version="1" comment="moodle-nl is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060246" version="1" comment="moodle-nn is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060247" version="1" comment="moodle-no is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060248" version="1" comment="moodle-pl is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060249" version="1" comment="moodle-pt is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060250" version="1" comment="moodle-ro is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060251" version="1" comment="moodle-ru is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060252" version="1" comment="moodle-sk is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060253" version="1" comment="moodle-sl is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060254" version="1" comment="moodle-so is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060255" version="1" comment="moodle-sq is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060256" version="1" comment="moodle-sr is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060257" version="1" comment="moodle-sv is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060258" version="1" comment="moodle-th is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060259" version="1" comment="moodle-tl is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060260" version="1" comment="moodle-tr is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060261" version="1" comment="moodle-uk is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060262" version="1" comment="moodle-vi is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060263" version="1" comment="moodle-zh_cn is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060264" version="1" comment="moodle is &lt;1.9.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063568" version="1" comment="libmysqlclient-devel is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063569" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063570" version="1" comment="libmysqlclient15-64bit is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063571" version="1" comment="libmysqlclient15 is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063572" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063573" version="1" comment="libmysqlclient_r15-64bit is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063574" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063575" version="1" comment="mysql-Max is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063576" version="1" comment="mysql-bench is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063577" version="1" comment="mysql-client is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063578" version="1" comment="mysql-debug is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063579" version="1" comment="mysql-test is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063580" version="1" comment="mysql-tools is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063581" version="1" comment="mysql is &lt;5.0.67-12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061756" version="1" comment="clamav-db is &lt;0.96.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061754" version="1" comment="clamav is &lt;0.96.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062104" version="1" comment="freetype2-32bit is &lt;2.3.7-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062105" version="1" comment="freetype2-64bit is &lt;2.3.7-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062106" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062107" version="1" comment="freetype2-devel-64bit is &lt;2.3.7-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062108" version="1" comment="freetype2-devel is &lt;2.3.7-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062109" version="1" comment="freetype2 is &lt;2.3.7-24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062323" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062324" version="1" comment="php5-bcmath is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062325" version="1" comment="php5-bz2 is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062326" version="1" comment="php5-calendar is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062327" version="1" comment="php5-ctype is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062328" version="1" comment="php5-curl is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062329" version="1" comment="php5-dba is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062330" version="1" comment="php5-dbase is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062367" version="1" comment="php5-devel is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062331" version="1" comment="php5-dom is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062332" version="1" comment="php5-exif is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062333" version="1" comment="php5-fastcgi is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062334" version="1" comment="php5-ftp is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062335" version="1" comment="php5-gd is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062336" version="1" comment="php5-gettext is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062337" version="1" comment="php5-gmp is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062338" version="1" comment="php5-hash is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062339" version="1" comment="php5-iconv is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062368" version="1" comment="php5-imap is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062340" version="1" comment="php5-json is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062341" version="1" comment="php5-ldap is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062342" version="1" comment="php5-mbstring is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062343" version="1" comment="php5-mcrypt is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062344" version="1" comment="php5-mysql is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062369" version="1" comment="php5-ncurses is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062345" version="1" comment="php5-odbc is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062346" version="1" comment="php5-openssl is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062347" version="1" comment="php5-pcntl is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062348" version="1" comment="php5-pdo is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062349" version="1" comment="php5-pear is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062350" version="1" comment="php5-pgsql is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062370" version="1" comment="php5-posix is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062351" version="1" comment="php5-pspell is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062371" version="1" comment="php5-readline is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062352" version="1" comment="php5-shmop is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062353" version="1" comment="php5-snmp is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062354" version="1" comment="php5-soap is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062372" version="1" comment="php5-sockets is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062373" version="1" comment="php5-sqlite is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062355" version="1" comment="php5-suhosin is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062356" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062357" version="1" comment="php5-sysvsem is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062358" version="1" comment="php5-sysvshm is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062374" version="1" comment="php5-tidy is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062359" version="1" comment="php5-tokenizer is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062360" version="1" comment="php5-wddx is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062361" version="1" comment="php5-xmlreader is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062362" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062363" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062364" version="1" comment="php5-xsl is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062365" version="1" comment="php5-zip is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062366" version="1" comment="php5-zlib is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061775" version="1" comment="exim is &lt;4.69-70.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061776" version="1" comment="eximon is &lt;4.69-70.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061777" version="1" comment="eximstats-html is &lt;4.69-70.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062723" version="1" comment="popt-32bit is &lt;1.7-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062724" version="1" comment="popt-64bit is &lt;1.7-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062725" version="1" comment="popt-devel is &lt;1.7-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062726" version="1" comment="popt is &lt;1.7-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062727" version="1" comment="rpm-32bit is &lt;4.4.2.3-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062728" version="1" comment="rpm-64bit is &lt;4.4.2.3-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062729" version="1" comment="rpm-devel-static is &lt;4.4.2.3-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062730" version="1" comment="rpm-devel is &lt;4.4.2.3-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062731" version="1" comment="rpm is &lt;4.4.2.3-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061699" version="1" comment="w3m-inline-image is &lt;0.5.2-128.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061700" version="1" comment="w3m is &lt;0.5.2-128.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061374" version="1" comment="moodle-af is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061375" version="1" comment="moodle-ar is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061376" version="1" comment="moodle-be is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061377" version="1" comment="moodle-bg is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061378" version="1" comment="moodle-bs is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061379" version="1" comment="moodle-ca is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061380" version="1" comment="moodle-cs is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061381" version="1" comment="moodle-da is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061382" version="1" comment="moodle-de is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061383" version="1" comment="moodle-de_du is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061384" version="1" comment="moodle-el is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061385" version="1" comment="moodle-es is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061386" version="1" comment="moodle-et is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061387" version="1" comment="moodle-eu is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061388" version="1" comment="moodle-fa is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061389" version="1" comment="moodle-fi is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061390" version="1" comment="moodle-fr is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061391" version="1" comment="moodle-ga is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061392" version="1" comment="moodle-gl is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061393" version="1" comment="moodle-he is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061394" version="1" comment="moodle-hi is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061395" version="1" comment="moodle-hr is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061396" version="1" comment="moodle-hu is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061397" version="1" comment="moodle-id is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061398" version="1" comment="moodle-is is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061399" version="1" comment="moodle-it is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061400" version="1" comment="moodle-ja is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061401" version="1" comment="moodle-ka is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061402" version="1" comment="moodle-km is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061403" version="1" comment="moodle-kn is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061404" version="1" comment="moodle-ko is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061405" version="1" comment="moodle-lt is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061406" version="1" comment="moodle-lv is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061407" version="1" comment="moodle-mi_tn is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061408" version="1" comment="moodle-ms is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061409" version="1" comment="moodle-nl is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061410" version="1" comment="moodle-nn is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061411" version="1" comment="moodle-no is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061412" version="1" comment="moodle-pl is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061413" version="1" comment="moodle-pt is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061414" version="1" comment="moodle-ro is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061415" version="1" comment="moodle-ru is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061416" version="1" comment="moodle-sk is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061417" version="1" comment="moodle-sl is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061418" version="1" comment="moodle-so is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061419" version="1" comment="moodle-sq is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061420" version="1" comment="moodle-sr is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061421" version="1" comment="moodle-sv is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061422" version="1" comment="moodle-th is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061423" version="1" comment="moodle-tl is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061424" version="1" comment="moodle-tr is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061425" version="1" comment="moodle-uk is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061426" version="1" comment="moodle-vi is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061427" version="1" comment="moodle-zh_cn is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061428" version="1" comment="moodle is &lt;1.9.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062733" version="1" comment="libvirt-devel is &lt;0.4.6-11.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062734" version="1" comment="libvirt-doc is &lt;0.4.6-11.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062735" version="1" comment="libvirt-python is &lt;0.4.6-11.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062736" version="1" comment="libvirt is &lt;0.4.6-11.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060889" version="1" comment="lftp is &lt;3.6.3-5.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061137" version="1" comment="kvirc-devel is &lt;3.4.2-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061138" version="1" comment="kvirc is &lt;3.4.2-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061807" version="1" comment="bogofilter is &lt;1.1.1-174.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063777" version="1" comment="mipv6d is &lt;2.0.2-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062742" version="1" comment="lvm2-clvm is &lt;2.02.39-8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062743" version="1" comment="lvm2 is &lt;2.02.39-8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061961" version="1" comment="gpg2-lang is &lt;2.0.9-25.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061962" version="1" comment="gpg2 is &lt;2.0.9-25.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062161" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b18-1.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062162" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b18-1.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062163" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6.0.0_b18-1.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062164" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.6.0.0_b18-1.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062165" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6.0.0_b18-1.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062166" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b18-1.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063290" version="1" comment="gwenview-lang is &lt;1.4.2-116.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063291" version="1" comment="gwenview is &lt;1.4.2-116.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063292" version="1" comment="kde4-gwenview is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063293" version="1" comment="kde4-kcolorchooser is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063294" version="1" comment="kde4-kgamma is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063295" version="1" comment="kde4-kio_kamera is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063296" version="1" comment="kde4-kolourpaint is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063297" version="1" comment="kde4-kruler is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063298" version="1" comment="kde4-ksnapshot is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063299" version="1" comment="kde4-okular-devel is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063300" version="1" comment="kde4-okular is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063301" version="1" comment="kdegraphics4 is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063302" version="1" comment="libkdcraw7-devel is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063303" version="1" comment="libkdcraw7 is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063304" version="1" comment="libkexiv2-7-devel is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063305" version="1" comment="libkexiv2-7 is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063306" version="1" comment="libkipi-devel is &lt;0.1.6-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063307" version="1" comment="libkipi5-devel is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063308" version="1" comment="libkipi5 is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063309" version="1" comment="libksane0 is &lt;4.1.3-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062048" version="1" comment="opera is &lt;10.61-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064014" version="1" comment="seamonkey-dom-inspector is &lt;2.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064015" version="1" comment="seamonkey-irc is &lt;2.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064016" version="1" comment="seamonkey-venkman is &lt;2.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064017" version="1" comment="seamonkey is &lt;2.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063393" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063394" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063395" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063396" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063397" version="1" comment="mozilla-xulrunner191-translations-common is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063398" version="1" comment="mozilla-xulrunner191-translations-other is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063399" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063400" version="1" comment="python-xpcom191 is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063401" version="1" comment="MozillaThunderbird-devel is &lt;3.0.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063402" version="1" comment="MozillaThunderbird-translations-common is &lt;3.0.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063403" version="1" comment="MozillaThunderbird-translations-other is &lt;3.0.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063404" version="1" comment="MozillaThunderbird is &lt;3.0.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063424" version="1" comment="enigmail is &lt;1.0.1-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062744" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062745" version="1" comment="MozillaFirefox-translations-common is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062746" version="1" comment="MozillaFirefox-translations-other is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062747" version="1" comment="MozillaFirefox is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062748" version="1" comment="mozilla-js192-32bit is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062749" version="1" comment="mozilla-js192 is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062750" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062751" version="1" comment="mozilla-xulrunner192-buildsymbols is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062752" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062753" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062754" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062755" version="1" comment="mozilla-xulrunner192-translations-common-32bit is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062756" version="1" comment="mozilla-xulrunner192-translations-common is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062757" version="1" comment="mozilla-xulrunner192-translations-other-32bit is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062758" version="1" comment="mozilla-xulrunner192-translations-other is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062759" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064131" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064132" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064133" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064134" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064135" version="1" comment="mozilla-xulrunner191-translations-common is &lt;1.9.1.15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064136" version="1" comment="mozilla-xulrunner191-translations-other is &lt;1.9.1.15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064137" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064138" version="1" comment="python-xpcom191 is &lt;1.9.1.15-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063901" version="1" comment="MozillaThunderbird-devel is &lt;3.0.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063902" version="1" comment="MozillaThunderbird-translations-common is &lt;3.0.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063903" version="1" comment="MozillaThunderbird-translations-other is &lt;3.0.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063904" version="1" comment="MozillaThunderbird is &lt;3.0.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064018" version="1" comment="enigmail is &lt;1.0.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062760" version="1" comment="seamonkey-dom-inspector is &lt;2.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062761" version="1" comment="seamonkey-irc is &lt;2.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062762" version="1" comment="seamonkey-venkman is &lt;2.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062763" version="1" comment="seamonkey is &lt;2.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061949" version="1" comment="kvirc-devel is &lt;3.4.2-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061950" version="1" comment="kvirc is &lt;3.4.2-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064139" version="1" comment="kernel-debug-base is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064140" version="1" comment="kernel-debug-extra is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064141" version="1" comment="kernel-debug is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064142" version="1" comment="kernel-default-base is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064143" version="1" comment="kernel-default-extra is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064144" version="1" comment="kernel-default is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064145" version="1" comment="kernel-docs is &lt;2.6.3-3.13.122" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064146" version="1" comment="kernel-kdump is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064147" version="1" comment="kernel-pae-base is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064148" version="1" comment="kernel-pae-extra is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064149" version="1" comment="kernel-pae is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064150" version="1" comment="kernel-ppc64-base is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064151" version="1" comment="kernel-ppc64-extra is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064152" version="1" comment="kernel-ppc64 is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064153" version="1" comment="kernel-ps3 is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064154" version="1" comment="kernel-source is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064155" version="1" comment="kernel-syms is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064156" version="1" comment="kernel-trace-base is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064157" version="1" comment="kernel-trace-extra is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064158" version="1" comment="kernel-trace is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064159" version="1" comment="kernel-vanilla is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064160" version="1" comment="kernel-xen-base is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064161" version="1" comment="kernel-xen-extra is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064162" version="1" comment="kernel-xen is &lt;2.6.27.54-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063363" version="1" comment="acroread-cmaps is &lt;9.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063364" version="1" comment="acroread-fonts-ja is &lt;9.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063365" version="1" comment="acroread-fonts-ko is &lt;9.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063366" version="1" comment="acroread-fonts-zh_CN is &lt;9.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063367" version="1" comment="acroread-fonts-zh_TW is &lt;9.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063368" version="1" comment="acroread is &lt;9.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062813" version="1" comment="flash-player is &lt;10.1.85.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065423" version="1" comment="libsmi-devel is &lt;0.4.5-1.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065424" version="1" comment="libsmi is &lt;0.4.5-1.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063766" version="1" comment="OpenOffice_org-draw is &lt;3.0.0.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063767" version="1" comment="OpenOffice_org-impress-devel is &lt;3.0.0.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063768" version="1" comment="OpenOffice_org-impress-l10n-prebuilt is &lt;3.0.0.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063769" version="1" comment="OpenOffice_org-impress is &lt;3.0.0.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063770" version="1" comment="OpenOffice_org-libs-gui-devel is &lt;3.0.0.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063771" version="1" comment="OpenOffice_org-libs-gui-l10n-prebuilt is &lt;3.0.0.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063772" version="1" comment="OpenOffice_org-libs-gui is &lt;3.0.0.9-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064321" version="1" comment="libopenssl-devel is &lt;0.9.8h-28.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064322" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-28.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064323" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8h-28.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064324" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-28.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064325" version="1" comment="openssl-doc is &lt;0.9.8h-28.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064326" version="1" comment="openssl is &lt;0.9.8h-28.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063462" version="1" comment="libHX13-32bit is &lt;1.23-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063463" version="1" comment="libHX13-64bit is &lt;1.23-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063464" version="1" comment="libHX13 is &lt;1.23-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064518" version="1" comment="quagga-devel is &lt;0.99.17-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064519" version="1" comment="quagga is &lt;0.99.17-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063045" version="1" comment="kernel-debug-base is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063046" version="1" comment="kernel-debug-extra is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063047" version="1" comment="kernel-debug is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063048" version="1" comment="kernel-default-base is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063049" version="1" comment="kernel-default-extra is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063050" version="1" comment="kernel-default is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063051" version="1" comment="kernel-docs is &lt;2.6.3-3.13.116" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063052" version="1" comment="kernel-kdump is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063053" version="1" comment="kernel-pae-base is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063054" version="1" comment="kernel-pae-extra is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063055" version="1" comment="kernel-pae is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063056" version="1" comment="kernel-ppc64-base is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063057" version="1" comment="kernel-ppc64-extra is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063058" version="1" comment="kernel-ppc64 is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063059" version="1" comment="kernel-ps3 is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063060" version="1" comment="kernel-source is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063061" version="1" comment="kernel-syms is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063062" version="1" comment="kernel-trace-base is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063063" version="1" comment="kernel-trace-extra is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063064" version="1" comment="kernel-trace is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063065" version="1" comment="kernel-vanilla is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063066" version="1" comment="kernel-xen-base is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063067" version="1" comment="kernel-xen-extra is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063068" version="1" comment="kernel-xen is &lt;2.6.27.48-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065055" version="1" comment="kernel-debug-base is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065056" version="1" comment="kernel-debug-extra is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065057" version="1" comment="kernel-debug is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065058" version="1" comment="kernel-default-base is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065059" version="1" comment="kernel-default-extra is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065060" version="1" comment="kernel-default is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065061" version="1" comment="kernel-docs is &lt;2.6.3-3.13.135" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065062" version="1" comment="kernel-kdump is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065063" version="1" comment="kernel-pae-base is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065064" version="1" comment="kernel-pae-extra is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065065" version="1" comment="kernel-pae is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065066" version="1" comment="kernel-ppc64-base is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065067" version="1" comment="kernel-ppc64-extra is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065068" version="1" comment="kernel-ppc64 is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065069" version="1" comment="kernel-ps3 is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065070" version="1" comment="kernel-source is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065071" version="1" comment="kernel-syms is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065072" version="1" comment="kernel-trace-base is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065073" version="1" comment="kernel-trace-extra is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065074" version="1" comment="kernel-trace is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065075" version="1" comment="kernel-vanilla is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065076" version="1" comment="kernel-xen-base is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065077" version="1" comment="kernel-xen-extra is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065078" version="1" comment="kernel-xen is &lt;2.6.27.56-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063477" version="1" comment="freetype2-32bit is &lt;2.3.7-24.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063478" version="1" comment="freetype2-64bit is &lt;2.3.7-24.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063479" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-24.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063480" version="1" comment="freetype2-devel-64bit is &lt;2.3.7-24.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063481" version="1" comment="freetype2-devel is &lt;2.3.7-24.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063482" version="1" comment="freetype2 is &lt;2.3.7-24.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063088" version="1" comment="cifs-mount is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063089" version="1" comment="ldapsmb is &lt;1.34b-6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063090" version="1" comment="libnetapi-devel is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063091" version="1" comment="libnetapi0 is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063092" version="1" comment="libsmbclient-devel is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063093" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063094" version="1" comment="libsmbclient0-64bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063095" version="1" comment="libsmbclient0 is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063096" version="1" comment="libsmbsharemodes-devel is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063097" version="1" comment="libsmbsharemodes0 is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063098" version="1" comment="libtalloc-devel is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063099" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063100" version="1" comment="libtalloc1-64bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063101" version="1" comment="libtalloc1 is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063102" version="1" comment="libtdb-devel is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063103" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063104" version="1" comment="libtdb1-64bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063105" version="1" comment="libtdb1 is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063106" version="1" comment="libwbclient-devel is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063107" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063108" version="1" comment="libwbclient0-64bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063109" version="1" comment="libwbclient0 is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063110" version="1" comment="samba-32bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063111" version="1" comment="samba-64bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063112" version="1" comment="samba-client-32bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063113" version="1" comment="samba-client-64bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063114" version="1" comment="samba-client is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063115" version="1" comment="samba-devel is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063116" version="1" comment="samba-krb-printing is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063117" version="1" comment="samba-vscan is &lt;0.3.6b-6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063118" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063119" version="1" comment="samba-winbind-64bit is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063120" version="1" comment="samba-winbind is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063121" version="1" comment="samba is &lt;3.2.7-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063773" version="1" comment="squid3 is &lt;3.0.STABLE10-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064853" version="1" comment="encfs is &lt;1.5.0-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063906" version="1" comment="libfreebl3-32bit is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064019" version="1" comment="libfreebl3-64bit is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063907" version="1" comment="libfreebl3 is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063908" version="1" comment="mozilla-nspr-32bit is &lt;4.8.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064020" version="1" comment="mozilla-nspr-64bit is &lt;4.8.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063909" version="1" comment="mozilla-nspr-devel is &lt;4.8.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063910" version="1" comment="mozilla-nspr is &lt;4.8.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063911" version="1" comment="mozilla-nss-32bit is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064021" version="1" comment="mozilla-nss-64bit is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063912" version="1" comment="mozilla-nss-devel is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063913" version="1" comment="mozilla-nss-tools is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063914" version="1" comment="mozilla-nss is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064163" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064164" version="1" comment="MozillaFirefox-translations-common is &lt;3.6.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064165" version="1" comment="MozillaFirefox-translations-other is &lt;3.6.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064166" version="1" comment="MozillaFirefox is &lt;3.6.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064167" version="1" comment="mozilla-js192-32bit is &lt;1.9.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064168" version="1" comment="mozilla-js192 is &lt;1.9.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064169" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064170" version="1" comment="mozilla-xulrunner192-buildsymbols is &lt;1.9.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064171" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064172" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064173" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064174" version="1" comment="mozilla-xulrunner192-translations-common-32bit is &lt;1.9.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064175" version="1" comment="mozilla-xulrunner192-translations-common is &lt;1.9.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064176" version="1" comment="mozilla-xulrunner192-translations-other-32bit is &lt;1.9.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064177" version="1" comment="mozilla-xulrunner192-translations-other is &lt;1.9.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064178" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.12-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064984" version="1" comment="subversion-devel is &lt;1.5.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064985" version="1" comment="subversion-perl is &lt;1.5.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064986" version="1" comment="subversion-python is &lt;1.5.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064987" version="1" comment="subversion-server is &lt;1.5.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064988" version="1" comment="subversion-tools is &lt;1.5.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064989" version="1" comment="subversion is &lt;1.5.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064022" version="1" comment="postgresql-contrib is &lt;8.3.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064023" version="1" comment="postgresql-devel is &lt;8.3.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064024" version="1" comment="postgresql-docs is &lt;8.3.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064025" version="1" comment="postgresql-libs-32bit is &lt;8.3.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064026" version="1" comment="postgresql-libs-64bit is &lt;8.3.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064027" version="1" comment="postgresql-libs is &lt;8.3.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064028" version="1" comment="postgresql-plperl is &lt;8.3.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064029" version="1" comment="postgresql-plpython is &lt;8.3.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064030" version="1" comment="postgresql-pltcl is &lt;8.3.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064031" version="1" comment="postgresql-server is &lt;8.3.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064032" version="1" comment="postgresql is &lt;8.3.12-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064073" version="1" comment="clamav-db is &lt;0.96.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064074" version="1" comment="clamav is &lt;0.96.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064542" version="1" comment="openslp-32bit is &lt;1.2.0-168.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064543" version="1" comment="openslp-64bit is &lt;1.2.0-168.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064544" version="1" comment="openslp-devel is &lt;1.2.0-168.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064545" version="1" comment="openslp-server is &lt;1.2.0-168.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064546" version="1" comment="openslp is &lt;1.2.0-168.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064245" version="1" comment="flash-player is &lt;10.1.102.64-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064857" version="1" comment="acroread-cmaps is &lt;9.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064858" version="1" comment="acroread-fonts-ja is &lt;9.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064859" version="1" comment="acroread-fonts-ko is &lt;9.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064860" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064861" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064862" version="1" comment="acroread is &lt;9.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065319" version="1" comment="xpdf-tools is &lt;3.02-97.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065320" version="1" comment="xpdf is &lt;3.02-97.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064493" version="1" comment="libpoppler-devel is &lt;0.10.1-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064494" version="1" comment="libpoppler-doc is &lt;0.10.1-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064495" version="1" comment="libpoppler-glib-devel is &lt;0.10.1-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064496" version="1" comment="libpoppler-glib4 is &lt;0.10.1-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064497" version="1" comment="libpoppler-qt2 is &lt;0.10.1-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064498" version="1" comment="libpoppler-qt3-devel is &lt;0.10.1-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064499" version="1" comment="libpoppler-qt4-3 is &lt;0.10.1-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064500" version="1" comment="libpoppler-qt4-devel is &lt;0.10.1-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064501" version="1" comment="libpoppler4 is &lt;0.10.1-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064502" version="1" comment="poppler-tools is &lt;0.10.1-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062564" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062565" version="1" comment="php5-bcmath is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062566" version="1" comment="php5-bz2 is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062567" version="1" comment="php5-calendar is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062568" version="1" comment="php5-ctype is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062569" version="1" comment="php5-curl is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062570" version="1" comment="php5-dba is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062571" version="1" comment="php5-dbase is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062572" version="1" comment="php5-devel is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062573" version="1" comment="php5-dom is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062574" version="1" comment="php5-exif is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062575" version="1" comment="php5-fastcgi is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062576" version="1" comment="php5-ftp is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062577" version="1" comment="php5-gd is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062578" version="1" comment="php5-gettext is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062579" version="1" comment="php5-gmp is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062580" version="1" comment="php5-hash is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062581" version="1" comment="php5-iconv is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062582" version="1" comment="php5-imap is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062583" version="1" comment="php5-json is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062584" version="1" comment="php5-ldap is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062585" version="1" comment="php5-mbstring is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062586" version="1" comment="php5-mcrypt is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062588" version="1" comment="php5-mysql is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062589" version="1" comment="php5-ncurses is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062590" version="1" comment="php5-odbc is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062591" version="1" comment="php5-openssl is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062592" version="1" comment="php5-pcntl is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062593" version="1" comment="php5-pdo is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062594" version="1" comment="php5-pear is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062595" version="1" comment="php5-pgsql is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062596" version="1" comment="php5-posix is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062597" version="1" comment="php5-pspell is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064714" version="1" comment="php5-readline is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062598" version="1" comment="php5-shmop is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062599" version="1" comment="php5-snmp is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062600" version="1" comment="php5-soap is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062601" version="1" comment="php5-sockets is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062602" version="1" comment="php5-sqlite is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062603" version="1" comment="php5-suhosin is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062604" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062605" version="1" comment="php5-sysvsem is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062606" version="1" comment="php5-sysvshm is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062613" version="1" comment="php5-tidy is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062607" version="1" comment="php5-tokenizer is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062608" version="1" comment="php5-wddx is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062609" version="1" comment="php5-xmlreader is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062610" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064715" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062611" version="1" comment="php5-xsl is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064716" version="1" comment="php5-zip is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062612" version="1" comment="php5-zlib is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064179" version="1" comment="seamonkey-dom-inspector is &lt;2.0.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064180" version="1" comment="seamonkey-irc is &lt;2.0.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064181" version="1" comment="seamonkey-venkman is &lt;2.0.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064182" version="1" comment="seamonkey is &lt;2.0.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064183" version="1" comment="MozillaThunderbird-devel is &lt;3.0.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064184" version="1" comment="MozillaThunderbird-translations-common is &lt;3.0.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064185" version="1" comment="MozillaThunderbird-translations-other is &lt;3.0.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064186" version="1" comment="MozillaThunderbird is &lt;3.0.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064187" version="1" comment="enigmail is &lt;1.0.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064819" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b20.1.9.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064820" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b20.1.9.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064821" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6.0.0_b20.1.9.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064822" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.6.0.0_b20.1.9.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064823" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6.0.0_b20.1.9.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064824" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b20.1.9.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064431" version="1" comment="libopenssl-devel is &lt;0.9.8h-28.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064432" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-28.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064433" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8h-28.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064434" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-28.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064435" version="1" comment="openssl-doc is &lt;0.9.8h-28.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064436" version="1" comment="openssl is &lt;0.9.8h-28.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063837" version="1" comment="festival-devel is &lt;1.96-72.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063838" version="1" comment="festival is &lt;1.96-72.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064600" version="1" comment="libxml2-32bit is &lt;2.7.1-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064601" version="1" comment="libxml2-64bit is &lt;2.7.1-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064602" version="1" comment="libxml2-devel-32bit is &lt;2.7.1-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064603" version="1" comment="libxml2-devel-64bit is &lt;2.7.1-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064604" version="1" comment="libxml2-devel is &lt;2.7.1-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064605" version="1" comment="libxml2-doc is &lt;2.7.1-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064606" version="1" comment="libxml2 is &lt;2.7.1-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065443" version="1" comment="libopenssl-devel is &lt;0.9.8h-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065444" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065445" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8h-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065446" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065447" version="1" comment="openssl-doc is &lt;0.9.8h-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065448" version="1" comment="openssl is &lt;0.9.8h-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064338" version="1" comment="moodle-af is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064339" version="1" comment="moodle-ar is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064340" version="1" comment="moodle-be is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064341" version="1" comment="moodle-bg is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064342" version="1" comment="moodle-bs is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064343" version="1" comment="moodle-ca is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064344" version="1" comment="moodle-cs is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064345" version="1" comment="moodle-da is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064346" version="1" comment="moodle-de is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064347" version="1" comment="moodle-de_du is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064348" version="1" comment="moodle-el is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064349" version="1" comment="moodle-es is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064350" version="1" comment="moodle-et is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064351" version="1" comment="moodle-eu is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064352" version="1" comment="moodle-fa is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064353" version="1" comment="moodle-fi is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064354" version="1" comment="moodle-fr is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064355" version="1" comment="moodle-ga is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064356" version="1" comment="moodle-gl is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064357" version="1" comment="moodle-he is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064358" version="1" comment="moodle-hi is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064359" version="1" comment="moodle-hr is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064360" version="1" comment="moodle-hu is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064361" version="1" comment="moodle-id is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064362" version="1" comment="moodle-is is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064363" version="1" comment="moodle-it is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064364" version="1" comment="moodle-ja is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064365" version="1" comment="moodle-ka is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064366" version="1" comment="moodle-km is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064367" version="1" comment="moodle-kn is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064368" version="1" comment="moodle-ko is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064369" version="1" comment="moodle-lt is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064370" version="1" comment="moodle-lv is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064371" version="1" comment="moodle-mi_tn is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064372" version="1" comment="moodle-ms is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064373" version="1" comment="moodle-nl is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064374" version="1" comment="moodle-nn is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064375" version="1" comment="moodle-no is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064376" version="1" comment="moodle-pl is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064377" version="1" comment="moodle-pt is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064378" version="1" comment="moodle-ro is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064379" version="1" comment="moodle-ru is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064380" version="1" comment="moodle-sk is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064381" version="1" comment="moodle-sl is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064382" version="1" comment="moodle-so is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064383" version="1" comment="moodle-sq is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064384" version="1" comment="moodle-sr is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064385" version="1" comment="moodle-sv is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064386" version="1" comment="moodle-th is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064387" version="1" comment="moodle-tl is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064388" version="1" comment="moodle-tr is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064389" version="1" comment="moodle-uk is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064390" version="1" comment="moodle-vi is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064391" version="1" comment="moodle-zh_cn is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064392" version="1" comment="moodle is &lt;1.9.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064996" version="1" comment="clamav-db is &lt;0.96.5-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064950" version="1" comment="clamav is &lt;0.96.5-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065162" version="1" comment="exim is &lt;4.69-70.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065163" version="1" comment="eximon is &lt;4.69-70.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065164" version="1" comment="eximstats-html is &lt;4.69-70.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065324" version="1" comment="opera-gtk is &lt;11.00-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065325" version="1" comment="opera-kde4 is &lt;11.00-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065326" version="1" comment="opera is &lt;11.00-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065499" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065500" version="1" comment="libopensc2-64bit is &lt;0.11.6-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065501" version="1" comment="libopensc2 is &lt;0.11.6-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065502" version="1" comment="opensc-32bit is &lt;0.11.6-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065503" version="1" comment="opensc-64bit is &lt;0.11.6-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065504" version="1" comment="opensc-devel is &lt;0.11.6-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065505" version="1" comment="opensc is &lt;0.11.6-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038906"/>
	</rpminfo_test>
 </tests>
 <objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ps3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-ijs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-omni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-obsolete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-webapps-tomcat6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-pipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-userdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-enhanced</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-test-suite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-panel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-panel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-panel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-panel-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-panel-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-vscan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-Max</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jhead</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-IRC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-InstantMessenger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-dialup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-lan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-lisa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-news</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-query</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-wireless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kdnssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knewsticker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kopete-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork4-filesharing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhowl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>optipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-hash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-spellchecker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-venkman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-gnomevfs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-translations-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xpcom190</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181-l10n-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181-l10n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-jsp-2_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-servlet-2_5-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpPgAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vinagre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-gnomevfs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xpcom191</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compiz-fusion-plugins-main-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compiz-fusion-plugins-main</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eID-belgium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpartx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-client-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-gui-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amarok-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amarok-libvisual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amarok-xine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amarok-yauap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amarok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-3D</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-fax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-kamera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-postscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-scan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-octave</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-writer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-writer-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-core-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-extern-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-extern-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-extern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-gui-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ganglia-monitor-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ganglia-monitor-core-gmetad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ganglia-monitor-core-gmond</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ganglia-monitor-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ganglia-webfrontend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ModemManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-openvpn-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cnetworkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audacity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-be</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-de_du</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-mi_tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-no</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-so</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-tl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-zh_cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-mono-providers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-pilot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ntlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-gnome-vfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-pulse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvolume_id-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvolume_id1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvolume_id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aufs-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aufs-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brocade-bfa-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brocade-bfa-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dazuko-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dazuko-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>intel-iamt-heci-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>intel-iamt-heci-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kqemu-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kqemu-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lirc-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-ose-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-ose-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vmware-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vmware-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-module-thai-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport-crashdb-opensuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport-retrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-browse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-gconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-lirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagickWand1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXerces-c28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_security2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid-beta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kompozer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-dom3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-impl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-xni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot11-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot11-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot11-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot11-fts-lucene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-IMAP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-SIEVE-managesieve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO-Socket-SSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>check-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>check-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>check</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>desktop-file-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-0_10-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisual-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisual-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htmldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmpiutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmpiutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-cim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-viewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vm-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoconf213</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-epiphany</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-google</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-thunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhtml-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aria2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>viewvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-ose-guest-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-ose-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-ose-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-ose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-driver-virtualbox-ose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>msmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-recursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enigmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-js192-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-js192</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations-common-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations-other-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-cmaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-sharp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmime-2_0-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fileshareset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-beagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-nsplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>misc-console-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvilj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ppower4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tgt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncpfs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncpfs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncpfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bytefx-data-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibm-data-db2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-complete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sybase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-jscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-locale-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-nunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winforms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monodoc-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdiplus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximstats-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m-inline-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvirc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mipv6d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lvm2-clvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenview-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-gwenview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kcolorchooser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kgamma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kio_kamera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kolourpaint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ksnapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-okular-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdcraw7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdcraw7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkexiv2-7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkexiv2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksane0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-impress-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-impress-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>encfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>festival-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>festival</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opera-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opera-kde4</name>
	</rpminfo_object>
 </objects>
 <states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.39-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-3.13.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.7-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11a-71.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-31.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-31.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-133.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-162.163.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update17-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u11-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.61.0-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.61.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:236-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p72-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-1001.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-10.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.76-32.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.63-118.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.83.0-22.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.62-221.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.11-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-13.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.10-60.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-107.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-107.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.2-5.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.67-12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.53.64-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.84-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2006c1_suse-127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-28.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-145.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.19-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-3.13.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.47-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-2.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-62.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_b14-24.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.15.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.19-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-16.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-16.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.26-1.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-49.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-1.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18.3-4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.12-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.1-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.63-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-246.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.6-140.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-16.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-16.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.10-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-5.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12-28.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.8-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-7.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.67-12.17.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.67-12.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p5-15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-13.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9p17-10.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-4.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-1.1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.7-1.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-4.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.16-1.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-121.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.22.87-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-26.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.18-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10-26.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-1.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-97.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p6-2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-7.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.17-171.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.4-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.6-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0.9-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0.9-1.11.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0.9-1.15.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0.9-1.12.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0.9-2.9.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1_b16-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.7-172.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.9-1.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.6-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r1053-11.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1_20081203-6.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7r848570-23.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.10-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5-49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3-1.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-28.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-44.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-44.59.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_b14-24.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_b14-24.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.24.1.1-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-31.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-31.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.21-2.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-28.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.21-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-3.13.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.21-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.15-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.15-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.24-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.10-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.19-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-21.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.5-105.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.5-105.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.5-105.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.5-105.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-18.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-23.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-9.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-97.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_b14-24.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-132.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14.4-8.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14.4-8.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.32.18-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.64-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.7-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-1.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-24.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.8-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.8-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update18-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u13-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:128-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:126-17.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:cvs20081020_2.6.27.23_0.1-1.32.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0.2_2.6.27.23_0.1-1.7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6_2.6.27.23_0.1-1.49.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.2.7_2.6.27.23_0.1-1.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0.31_2.6.27.23_0.1-2.40.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.23_0.1-89.11.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-3.13.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0pre1_2.6.27.23_0.1-2.1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78_2.6.27.23_0.1-6.6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78_2.6.27.23_0.1-6.6.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4_2.6.27.23_0.1-0.1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_2.6.27.23_0.1-21.15.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5_2.6.27.23_0.1-2.36.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_2.6.27.23_0.1-227.56.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.6_2.6.27.23_0.1-2.8.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.6_2.6.27.23_0.1-2.8.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2008.09.03_2.6.27.23_0.1-5.50.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.12-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.12-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.1-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.1-2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.00-6.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-23.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.114-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.870-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.14-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.22-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.18-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-3.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-28.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-25.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:cvs20081020_2.6.27.25_0.1-1.32.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0.2_2.6.27.25_0.1-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6_2.6.27.25_0.1-1.49.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.2.7_2.6.27.25_0.1-1.19.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0.31_2.6.27.25_0.1-2.40.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.25_0.1-89.11.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.25-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-3.13.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0pre1_2.6.27.25_0.1-2.1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78_2.6.27.25_0.1-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4_2.6.27.25_0.1-0.1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_2.6.27.25_0.1-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5_2.6.27.25_0.1-2.36.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_2.6.27.25_0.1-227.56.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.6_2.6.27.25_0.1-2.8.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2008.09.03_2.6.27.25_0.1-5.50.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-28.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-25.2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.48-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-3.13.109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:cvs20081020_2.6.27.29_0.1-1.32.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0.2_2.6.27.29_0.1-1.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6_2.6.27.29_0.1-1.49.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.2.7_2.6.27.29_0.1-1.19.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0.31_2.6.27.29_0.1-2.40.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.29_0.1-89.11.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.29-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-3.13.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0pre1_2.6.27.29_0.1-2.1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78_2.6.27.29_0.1-6.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4_2.6.27.29_0.1-0.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_2.6.27.29_0.1-21.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5_2.6.27.29_0.1-2.36.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_2.6.27.29_0.1-227.56.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.6_2.6.27.29_0.1-2.8.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2008.09.03_2.6.27.29_0.1-5.50.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-62.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.11-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.8-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.18-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.18-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.18-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.10-17.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-10.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.17-171.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.0-29.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.6-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.10-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.10-3.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.12-30.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-133.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-133.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.113.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.3-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.23-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-1.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.12-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2_b16-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-480.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_b16-0.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u15-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update20-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-2.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-438.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.STABLE10-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-1.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.12-68.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.95.8-64.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.99.0.4-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-2.22.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-238.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.13-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.13-0.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-2.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.11-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.11-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.11-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.11-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.13-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14.16-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14.16-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14.16-1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14.16-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-78.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.5.28.20080401-58.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.37-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-3.13.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.10-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.45-12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:IIIalpha9.8-690.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:IIIalpha9.8-690.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:IIIalpha9.8-690.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.5-63.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.5-63.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.5-63.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.5-63.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15-1.113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15-1.119</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-129.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-129.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-129.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.21-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.21-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.21-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.21-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-86.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-86.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-86.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-86.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.15-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.15-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.15-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.15-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-3.94</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-3.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-3.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.0-174.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.0-174.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.0-174.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.0-174.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-78.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-78.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-78.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-78.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.27-1.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.14-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.14-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.42-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-3.13.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.8-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-2.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-28.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-25.2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.01-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.2-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-132.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-3.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5-15.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-4.22.92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-11.16.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-64.26.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.3-3.30.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.27-0.1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24-0.4.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24_2.6.27.45_0.2-0.4.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.6-3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b20.1.9.1-0.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b17-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.19-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u22-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13-3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.8-46.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5-1.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.9-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5-10.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u19-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-28.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-25.2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4-194.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p6-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-97.81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.2.6.30.1_2.6.27.37_0.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.0.10.6-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.56-1.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-57.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.42.34-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update22-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u17-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.45-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-3.13.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.6-2.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.6_2.6.27.42_0.1-2.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.16-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.16-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11a-71.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.7-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.9-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-18.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-1.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r1053-11.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-31.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-31.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.26.44-98.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.7-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-28.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.47-27.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.11-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.5-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.11-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.16-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.13-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.13-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.45.2-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.2-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-4.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.82.76-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.12-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.17-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.17-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.13-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.249.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9p17-10.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-17.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-17.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-45.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20-23.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-132.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.60-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007-219.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.48_0.2-89.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15-89.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-147.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u20-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.12-30.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-16.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-62.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-15.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-157.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-4.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.3-2.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-132.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-132.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-133.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-1.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-11.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.8-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.67-12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-24.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.69-70.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-20.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-20.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-128.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-5.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-174.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-2.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.39-8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b18-1.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-116.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-4.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.61-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.8-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-5.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.10-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.15-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.54-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-3.13.122</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.85.3-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.5-1.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0.9-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-28.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.23-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.17-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.48-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-3.13.116</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.56-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-3.13.135</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-24.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.STABLE10-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.12-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.12-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.3-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-168.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.102.64-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-97.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b20.1.9.2-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-28.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.96-72.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-28.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.10-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.5-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.69-70.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.00-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.3.1</evr>
  </rpminfo_state>
 </states>
</oval_definitions>
